ECCC-Report TR09-123https://eccc.weizmann.ac.il/report/2009/123Comments and Revisions published for TR09-123en-usMon, 23 Nov 2009 23:07:08 +0200
Paper TR09-123
| Cryptographic Complexity Classes and Computational Intractability Assumptions |
Hemanta Maji,
Manoj Prabhakaran,
Mike Rosulek
https://eccc.weizmann.ac.il/report/2009/123Which computational intractability assumptions are inherent to cryptography? We present a broad framework to pose and investigate this question.
We first aim to understand the “cryptographic complexity” of various tasks, independent of any computational assumptions. In our framework the cryptographic tasks are modeled as multi- party computation functionalities. We consider a universally composable secure protocol for one task given access to another task as the most natural complexity reduction between the two tasks. Some of these cryptographic complexity reductions are unconditional, others are unconditionally impossible, but the vast majority appear to depend on computational assumptions; it is this relationship with computational assumptions that we study.
In our detailed investigation of large classes of 2-party functionalities, we find that every reduction we are able to classify turns out to be unconditionally true or false, or else equivalent to the existence of one-way functions (OWF) or of semi-honest (equivalently, standalone-secure) oblivious transfer protocols (sh-OT). This leads us to conjecture that there are only a small finite number of distinct computational assumptions that are inherent among the infinite number of different cryptographic reductions in our framework.
If indeed only a few computational intractability assumptions manifest in this framework, we propose that they are of an extraordinarily fundamental nature, since the framework contains a large variety of cryptographic tasks, and was formulated without regard to any of the prevalent computational intractability assumptions.Mon, 23 Nov 2009 23:07:08 +0200https://eccc.weizmann.ac.il/report/2009/123