Cryptographic Complexity Classes and Computational Intractability Assumptions

作者: Hemanta K. Maji , Mike Rosulek , Manoj Prabhakaran

DOI:

关键词:

摘要: Which computational intractability assumptions are inherent to cryptography? We present a broad framework pose and investigate this question. first aim understand the “cryptographic complexity” of various tasks, independent any assumptions. In our cryptographic tasks modeled as multi-party computation functionalities. consider universally composable secure protocol for one task given access another most natural complexity reduction between two tasks. Some these reductions unconditional, others unconditionally impossible, but vast majority appear depend on assumptions; it is relationship with that we study. detailed investigation large classes 2-party functionalities, find every able classify turns out be true or false, else equivalent existence one-way functions (OWF) semi-honest (equivalently, standalone-secure) oblivious transfer protocols (sh-OT). This leads us conjecture there only small finite number distinct among infinite different in framework. If indeed few manifest framework, propose they an extraordinarily fundamental nature, since contains variety was formulated without regard prevalent

参考文章(32)
Donald Beaver, Perfect Privacy For Two-Party Protocols. Distributed Computing And Cryptography. pp. 65- 78 ,(1989)
Eyal Kushilevitz, Benny Chor, A Zero-One Law for Boolean Privacy (extended abstract) symposium on the theory of computing. pp. 62- 72 ,(1989)
Russell Impagliazzo, Michael Luby, One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract) foundations of computer science. pp. 230- 235 ,(1989)
Mike Rosulek, Hemanta K. Maji, Manoj Prabhakaran, Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation theory of cryptography conference. pp. 256- 273 ,(2009) , 10.1007/978-3-642-00457-5_16
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Amos Beimel, Tal Malkin, Silvio Micali, The All-or-Nothing Nature of Two-Party Secure Computation international cryptology conference. pp. 80- 97 ,(1999) , 10.1007/3-540-48405-1_6
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi, On the necessary and sufficient assumptions for UC computation theory of cryptography conference. pp. 109- 127 ,(2010) , 10.1007/978-3-642-11799-2_8
Manoj Prabhakaran, Mike Rosulek, Towards Robust Computation on Encrypted Data international conference on the theory and application of cryptology and information security. pp. 216- 233 ,(2008) , 10.1007/978-3-540-89255-7_14
Iftach Haitner, Semi-honest to malicious oblivious transfer: the black-box way theory of cryptography conference. pp. 412- 426 ,(2008) , 10.1007/978-3-540-78524-8_23
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Founding Cryptography on Oblivious Transfer --- Efficiently international cryptology conference. pp. 572- 591 ,(2008) , 10.1007/978-3-540-85174-5_32