A Cookbook for Black-Box Separations and a Recipe for UOWHFs
نویسندگان
چکیده
We present a new framework for proving fully black-box separations and lower bounds. We prove a general theorem that facilitates the proofs of fully black-box lower bounds from a one-way function (OWF). Loosely speaking, our theorem says that in order to prove that a fully black-box construction does not securely construct a cryptographic primitive Q (e.g., a pseudo-random generator or a universal one-way hash function) from a OWF, it is enough to come up with a large enough set of functions F and a parameterized oracle (i.e., an oracle that is defined for every f ∈ {0, 1} → {0, 1}) such that Of breaks the security of the construction when instantiated with f and the oracle satisfies two local properties. Our main application of the theorem is a lower bound of Ω(n/ log(n)) on the number of calls made by any fully black-box construction of a universal one-way hash function (UOWHF) from a general one-way function. The bound holds even when the OWF is regular, in which case it matches to a recent construction of Barhum and Maurer [4].
منابع مشابه
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond
We revisit the problem of black-box constructions of universal one-way hash functions (UOWHFs) from several (from specific to more general) classes of one-way functions (OWFs), and give respective constructions that either improve or generalize the best previously known. In addition, the parameters we achieve are either optimal or almost optimal simultaneously up to small factors, e.g., arbitra...
متن کاملHow to Build Google2Google - An (Incomplete) Recipe
This talk explores aspects relevant for peer-to-peer search infrastructures, which we think are better suited to semantic web search than centralized approaches. It does so in the form of an (incomplete) cookbook recipe, listing necessary ingredients for putting together a distributed search infrastructure. The reader has to be aware, though, that many of these ingredients are research question...
متن کاملLower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
Indistinguishability obfuscation (IO) enables many heretofore outof-reach applications in cryptography. However, currently all known constructions of IO are based on multilinear maps which are poorly understood. Hence, tremendous research effort has been put towards basing obfuscation on betterunderstood computational assumptions. Recently, another path to IO has emerged through functional encr...
متن کاملA Note on Black-Box Separations for Indistinguishability Obfuscation
Mahmoody et al. (TCC 2016-A) showed that basing indistinguishability obfuscation (IO) on a wide range of primitives in a black-box way is as hard as basing public-key cryptography on one-way functions. The list included any primitive P that could be realized relative to random trapdoor permutation or degree-O(1) graded encoding oracle models in a secure way against computationally unbounded pol...
متن کاملA Study of Separations in Cryptography: New Results and New Models
Title of dissertation: A STUDY OF SEPARATIONS IN CRYPTOGRAPHY: NEW RESULTS AND NEW MODELS Arkady Yerukhimovich, Doctor of Philosophy, 2011 Dissertation directed by: Professor Jonathan Katz Department of Computer Science For more than 20 years, black-box impossibility results have been used to argue the infeasibility of constructing certain cryptographic primitives (e.g., key agreement) from oth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 19 شماره
صفحات -
تاریخ انتشار 2012