Structure vs. Hardness Through the Obfuscation Lens

被引:15
作者
Bitansky, Nir [1 ]
Degwekar, Akshay [1 ]
Vaikuntanathan, Vinod [1 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I | 2017年 / 10401卷
关键词
Indistinguishability obfuscation; Statistical zero-knowledge; NP boolean AND coNP; Structured hardness; Collision-resistant hashing; STATISTICAL ZERO-KNOWLEDGE; GENERIC CRYPTOGRAPHIC CONSTRUCTIONS; PUBLIC-KEY ENCRYPTION; SECURE HASH FUNCTIONS; FINDING COLLISIONS; LOWER BOUNDS; HOMOMORPHIC ENCRYPTION; LATTICE PROBLEMS; PROMISE PROBLEMS; COMPLEXITY;
D O I
10.1007/978-3-319-63688-7_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Much of modern cryptography, starting from public-key encryption and going beyond, is based on the hardness of structured (mostly algebraic) problems like factoring, discrete log or finding short lattice vectors. While structure is perhaps what enables advanced applications, it also puts the hardness of these problems in question. In particular, this structure often puts them in low complexity classes such as NP boolean AND coNP or statistical zero-knowledge (SZK). Is this structure really necessary? For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes-they imply hard problems in NP boolean AND coNP and SZK, respectively. In contrast, one-way functions do not imply such hard problems, at least not by fully black-box reductions. Yet, for many basic primitives such as public-key encryption, oblivious transfer, and functional encryption, we do not have any answer. We show that the above primitives, and many others, do not imply hard problems in NP boolean AND coNP or SZK via fully black-box reductions. In fact, we first show that even the very powerful notion of Indistinguishability Obfuscation (IO) does not imply such hard problems, and then deduce the same for a large class of primitives that can be constructed from IO.
引用
收藏
页码:696 / 723
页数:28
相关论文
共 82 条
  • [1] Lattice problems in NP∧coNP
    Aharonov, D
    Regev, O
    [J]. 45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, : 362 - 371
  • [2] STATISTICAL ZERO-KNOWLEDGE LANGUAGES CAN BE RECOGNIZED IN 2 ROUNDS
    AIELLO, W
    HASTAD, J
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1991, 42 (03) : 327 - 345
  • [3] More on average case vs approximation complexity
    Alekhnovich, M
    [J]. 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 298 - 307
  • [4] [Anonymous], 2000, P 41 ANN S FDN COMP
  • [5] [Anonymous], 1985, P 17 ANN ACM S THEOT
  • [6] [Anonymous], 2003, PRCEED 44 S FDN COMP
  • [7] [Anonymous], 1978, FDN SEC COMPUT
  • [8] [Anonymous], LNCS
  • [9] From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
    Applebaum, Benny
    Raykov, Pavel
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 65 - 82
  • [10] Applebaum B, 2010, ACM S THEORY COMPUT, P171