On Basing Private Information Retrieval on NP-Hardness

被引:13
作者
Liu, Tianren [1 ]
Vaikuntanathan, Vinod [1 ]
机构
[1] MIT CSAIL, Cambridge, MA 02139 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I | 2016年 / 9562卷
关键词
CODES;
D O I
10.1007/978-3-662-49096-9_16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The possibility of basing the security of cryptographic objects on the (minimal) assumption that NP subset of BPP is at the very heart of complexity-theoretic cryptography. Most known results along these lines are negative, showing that assuming widely believed complexity-theoretic conjectures, there are no reductions from an NP-hard problem to the task of breaking certain cryptographic schemes. We make progress along this line of inquiry by showing that the security of single-server single-round private information retrieval schemes cannot be based on NP-hardness, unless the polynomial hierarchy collapses. Our main technical contribution is in showing how to break the security of a PIR protocol given an SZK oracle. Our result is tight in terms of both the correctness and the privacy parameter of the PIR scheme.
引用
收藏
页码:372 / 386
页数:15
相关论文
共 24 条
[1]  
Akavia A., 2006, STOC'06. Proceedings of the 38th Annual ACM Symposium on Theory of Computing, P701, DOI 10.1145/1132516.1132614
[2]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073
[3]  
Beimel A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P89, DOI 10.1145/301250.301277
[4]   On worst-case to average-case reductions for NP problems [J].
Bogdanov, Andrej ;
Trevisan, Luca .
SIAM JOURNAL ON COMPUTING, 2006, 36 (04) :1119-1159
[5]  
Bogdanov A, 2015, LECT NOTES COMPUT SC, V9014, P1, DOI 10.1007/978-3-662-46494-6_1
[6]  
Bogdanov A, 2013, LECT NOTES COMPUT SC, V8042, P111, DOI 10.1007/978-3-642-40041-4_7
[7]  
Boneh D., KILIAN KIL05, P325
[8]   DOES CO-NP HAVE SHORT INTERACTIVE PROOFS [J].
BOPPANA, RB ;
HASTAD, J ;
ZACHOS, S .
INFORMATION PROCESSING LETTERS, 1987, 25 (02) :127-132
[9]   Efficient Fully Homomorphic Encryption from (Standard) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :97-106
[10]   RELATIVIZED CRYPTOGRAPHY [J].
BRASSARD, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (06) :877-894