Memory Checking Requires Logarithmic Overhead

被引:0
作者
Boyle, Elette [1 ,2 ]
Komargodski, Ilan [2 ,3 ]
Vafa, Neekon [4 ]
机构
[1] Reichman Univ, Herzliyya, Israel
[2] NTT Res, Sunnyvale, CA 94085 USA
[3] Hebrew Univ Jerusalem, Jerusalem, Israel
[4] MIT, Cambridge, MA USA
来源
PROCEEDINGS OF THE 56TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2024 | 2024年
关键词
Lower Bound; Memory Checking; Computational Security; OBLIVIOUS RAM;
D O I
10.1145/3618260.3649686
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of memory checkers with computational security and prove the first general tight lower bound. Memory checkers, first introduced over 30 years ago by Blum, Evans, Gemmel, Kannan, and Naor (FOCS 91, Algorithmica 94), allow a user to store and maintain a large memory on a remote and unreliable server by using small trusted local storage. The user can issue instructions to the server and after every instruction, obtain either the correct value or a failure (but not an incorrect answer) with high probability. The main complexity measure of interest is the size of the local storage and the number of queries the memory checker makes upon every logical instruction. The most efficient known construction has query complexity O(log n/log log n) and local space proportional to a computational security parameter, assuming one-way functions, where n is the logical memory size. Dwork, Naor, Rothblum, and Vaikuntanathan (TCC 09) showed that for a restricted class of deterministic and non-adaptive memory checkers, this construction is optimal, up to constant factors. However, going beyond the small class of deterministic and non-adaptive constructions has remained a major open problem. In this work, we fully resolve the complexity of memory checkers by showing that any construction with local space p and query complexity q must satisfy p >= n/(log n)(O(q)). This implies, as a special case, that q >= Omega(log n/log log n) in any scheme, assuming that p <= n(1-epsilon) for epsilon > 0. The bound applies to any scheme with computational security, completeness 2/3, and inverse polynomial in n soundness (all of which make our lower bound only stronger). We further extend the lower bound to schemes where the read complexity q(r) and write complexity q(w) differ. For instance, we show the tight bound that if q(r) = O(1) and p <= n(1-epsilon) for epsilon > 0, then q(w) >= n(Omega(1)). This is the first lower bound, for any non-trivial class of constructions, showing a read-write query complexity trade-off. Our proof is via a delicate compression argument showing that a too good to be true memory checker can be used to compress random bits of information. We draw inspiration from tools recently developed for lower bounds for relaxed locally decodable codes. However, our proof itself significantly departs from these works, necessitated by the differences between settings.
引用
收藏
页码:1712 / 1723
页数:12
相关论文
共 40 条
[1]   Oblivious RAM with Worst-Case Logarithmic Overhead [J].
Asharov, Gilad ;
Komargodski, Ilan ;
Lin, Wei-Kai ;
Shi, Elaine .
JOURNAL OF CRYPTOLOGY, 2023, 36 (02)
[2]   OptORAMa: Optimal Oblivious RAM [J].
Asharov, Gilad ;
Komargodski, Ilan ;
Lin, Wei-Kai ;
Nayak, Kartik ;
Peserico, Enoch ;
Shi, Elaine .
JOURNAL OF THE ACM, 2023, 70 (01)
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   CHECKING THE CORRECTNESS OF MEMORIES [J].
BLUM, M ;
EVANS, W ;
GEMMELL, P ;
KANNAN, S ;
NAOR, M .
ALGORITHMICA, 1994, 12 (2-3) :225-244
[5]   Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments [J].
Boneh, Dan ;
Drake, Justin ;
Fisch, Ben ;
Gabizon, Ariel .
ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 :649-680
[6]   Gemini: Elastic SNARKs for Diverse Environments [J].
Bootle, Jonathan ;
Chiesa, Alessandro ;
Hu, Yuncong ;
Orru, Michele .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 :427-457
[7]   Is There an Oblivious RAM Lower Bound? [J].
Boyle, Elette ;
Naor, Moni .
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, :357-368
[8]   Proofs for Inner Pairing Products and Applications [J].
Bunz, Benedikt ;
Maller, Mary ;
Mishra, Pratyush ;
Tyagi, Nirvan ;
Vesely, Psi .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 :65-97
[9]   A Lower Bound for One-Round Oblivious RAM [J].
Cash, David ;
Drucker, Andrew ;
Hoover, Alexander .
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 :457-485
[10]   Dynamic Proofs of Retrievability Via Oblivious RAM [J].
Cash, David ;
Kupcu, Alptekin ;
Wichs, Daniel .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :22-57