首页> 外文会议>The First symposium on innovations in computer science >Cryptographic Complexity Classes and Computational Intractability Assumptions
【24h】

Cryptographic Complexity Classes and Computational Intractability Assumptions

机译:加密复杂性类别和计算难易度假设

获取原文
获取原文并翻译 | 示例

摘要

Which computational intractability assumptions are inherent to cryptography? We present a broad framework to pose and investigate this question. We first aim to understand the "cryptographic complexity" of various tasks, independent of any computational assumptions. In our framework the cryptographic tasks are modeled as multi-party computation functionalities. We consider a universally composable secure protocol for one task given access to another task as the most natural complexity reduction between the two tasks. Some of these cryptographic complexity reductions are unconditional, others are unconditionally impossible, but the vast majority appear to depend on computational assumptions; it is this relationship with computational assumptions that we study. In our detailed investigation of large classes of 2-party functionalities, we find that every reduction we are able to classify turns out to be unconditionally true or false, or else equivalent to the existence of one-way functions (OWF) or of semi-honest (equivalently, standalone-secure) oblivious transfer protocols (sh-OT). This leads us to conjecture that there are only a small finite number of distinct computational assumptions that are inherent among the infinite number of different cryptographic reductions in our framework. If indeed only a few computational intractability assumptions manifest in this framework, we propose that they are of an extraordinarily fundamental nature, since the framework contains a large variety of cryptographic tasks, and was formulated without regard to any of the prevalent computational intractability assumptions.
机译:密码学固有哪些计算难点假设?我们提出了一个广泛的框架来提出和调查这个问题。我们首先旨在了解独立于任何计算假设的各种任务的“加密复杂性”。在我们的框架中,加密任务被建模为多方计算功能。我们将针对一个任务的通用可组合安全协议视为访问另一个任务,这是两个任务之间最自然的复杂性降低。这些加密复杂度降低中的一些是无条件降低的,而其他一些则是无条件地不可能的,但是绝大多数似乎依赖于计算假设。我们研究的正是这种与计算假设的关系。在我们对两方功能的大类进行详细研究时,我们发现,我们能够分类的每个归约结果都是无条件的对或错,或者等同于单向函数(OWF)或半单向函数的存在。诚实的(等效地,独立安全)遗忘的传输协议(sh-OT)。这使我们推测,在我们的框架中,无数种不同的密码学还原中只有少数是固有的不同计算假设。如果确实只有几个计算难解性假设出现在此框架中,那么我们建议它们具有非常基本的性质,因为该框架包含大量加密任务,并且在制定时不考虑任何流行的计算难解性假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号