Skip to main content

Some consequences of cryptographical conjectures for S 12 and EF

  • Conference paper
  • First Online:
Logic and Computational Complexity (LCC 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 960))

Included in the following conference series:

Abstract

We show that there is a pair of disjoint NP sets, whose disjointness is provable in S 12 and which cannot be separated by a set in P/poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 12 admitting an NP -definition of primes about which it can prove that no number satisfying the definition is composite.

As a corollary we obtain that the Extended Frege (EF) proof system does not admit a feasible interpolation theorem unless the RSA cryptosystem is not secure, and that an extension of EF by tautologies τ p (p primes), formalizing that p is not composite, as additional axioms does not admit feasible interpolation theorem unless factoring and the discrete logarithm are in P/poly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W.B. Alexi, B.Chor, O. Goldreich, C.P. Schnorr (1988) RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comp., 17, pp.194–209.

    Article  Google Scholar 

  2. S.R. Buss (1986) Bounded Arithmetic, Bibliopolis.

    Google Scholar 

  3. Cook, S. A. (1975) Feasibly constructive proofs and the propositional calculus, in: Proc. 7 th Annual ACM Symp. on Theory of Computing, pp. 83–97. ACM Press.

    Google Scholar 

  4. Krajíček, J. (1993) Fragments of bounded arithmetic and bounded query classes, Transactions of the A.M.S., 338(2): 587–598.

    Google Scholar 

  5. -(1994) Lower bounds to the size of constant-depth propositional proofs, Journal of Symbolic Logic, 59(1):73–86.

    Google Scholar 

  6. -(1994) Bounded arithmetic, propositional logic and complexity theory, Cambridge University Press, in print.

    Google Scholar 

  7. -(1994) Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic, submitted.

    Google Scholar 

  8. Krajíček, J., and Pudlák, P. (1989) Propositional proof systems, the consistency of first order theories and the complexity of computations, J. Symbolic Logic, 54(3):1063–1079

    Google Scholar 

  9. Krajíček, J., Pudlák, P., and Takeuti, G. (1991) Bounded arithmetic and the polynomial hierarchy, Annals of Pure and Applied Logic, 52: 143–153.

    Google Scholar 

  10. Papadimitriou, A. (1994) Computational complexity, Addison-Wesley.

    Google Scholar 

  11. Paris, J, and Wilkie, A. (1985) Counting problems in bounded arithmetic, in: Methods in Mathematical Logic, LNM 1130, pp.317–340.Springer.

    Google Scholar 

  12. Pratt, V.R. (1975) Every prime has a succinct certificate, SIAM J. Computing, 4:214–220.

    Article  Google Scholar 

  13. A.A. Razborov (1994) Unprovability of lower bounds on the circuit size in certain fragments of bounded arithmetic, Izvestiya of the RAN, to appear.

    Google Scholar 

  14. -(1994) On provably disjoint NP-pairs, Basic Research in Computer Science Center, Aarhus, RS-94-36, preprint.

    Google Scholar 

  15. M. Rivest, A. Shamir and L. Adleman (1978) A method of obtaining digital signatures and public-key cryptosystems. ACM Communications 21, pp. 120–126.

    Google Scholar 

  16. G. Takeuti (1992) RSUV isomorphism, in Arithmetic, Proof Theory and Computational Complexity, Clote and Krajíček eds., Oxford Univ. Press, pp. 364–386.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Daniel Leivant

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krajíček, J., Pudlák, P. (1995). Some consequences of cryptographical conjectures for S 12 and EF. In: Leivant, D. (eds) Logic and Computational Complexity. LCC 1994. Lecture Notes in Computer Science, vol 960. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60178-3_86

Download citation

  • DOI: https://doi.org/10.1007/3-540-60178-3_86

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60178-4

  • Online ISBN: 978-3-540-44720-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics