Abstract
We show that there is a pair of disjoint NP sets, whose disjointness is provable in S 12 and which cannot be separated by a set in P/poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 12 admitting an NP -definition of primes about which it can prove that no number satisfying the definition is composite.
As a corollary we obtain that the Extended Frege (EF) proof system does not admit a feasible interpolation theorem unless the RSA cryptosystem is not secure, and that an extension of EF by tautologies τ p (p primes), formalizing that p is not composite, as additional axioms does not admit feasible interpolation theorem unless factoring and the discrete logarithm are in P/poly.
Preview
Unable to display preview. Download preview PDF.
References
W.B. Alexi, B.Chor, O. Goldreich, C.P. Schnorr (1988) RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comp., 17, pp.194–209.
S.R. Buss (1986) Bounded Arithmetic, Bibliopolis.
Cook, S. A. (1975) Feasibly constructive proofs and the propositional calculus, in: Proc. 7 th Annual ACM Symp. on Theory of Computing, pp. 83–97. ACM Press.
Krajíček, J. (1993) Fragments of bounded arithmetic and bounded query classes, Transactions of the A.M.S., 338(2): 587–598.
-(1994) Lower bounds to the size of constant-depth propositional proofs, Journal of Symbolic Logic, 59(1):73–86.
-(1994) Bounded arithmetic, propositional logic and complexity theory, Cambridge University Press, in print.
-(1994) Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic, submitted.
Krajíček, J., and Pudlák, P. (1989) Propositional proof systems, the consistency of first order theories and the complexity of computations, J. Symbolic Logic, 54(3):1063–1079
Krajíček, J., Pudlák, P., and Takeuti, G. (1991) Bounded arithmetic and the polynomial hierarchy, Annals of Pure and Applied Logic, 52: 143–153.
Papadimitriou, A. (1994) Computational complexity, Addison-Wesley.
Paris, J, and Wilkie, A. (1985) Counting problems in bounded arithmetic, in: Methods in Mathematical Logic, LNM 1130, pp.317–340.Springer.
Pratt, V.R. (1975) Every prime has a succinct certificate, SIAM J. Computing, 4:214–220.
A.A. Razborov (1994) Unprovability of lower bounds on the circuit size in certain fragments of bounded arithmetic, Izvestiya of the RAN, to appear.
-(1994) On provably disjoint NP-pairs, Basic Research in Computer Science Center, Aarhus, RS-94-36, preprint.
M. Rivest, A. Shamir and L. Adleman (1978) A method of obtaining digital signatures and public-key cryptosystems. ACM Communications 21, pp. 120–126.
G. Takeuti (1992) RSUV isomorphism, in Arithmetic, Proof Theory and Computational Complexity, Clote and Krajíček eds., Oxford Univ. Press, pp. 364–386.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Krajíček, J., Pudlák, P. (1995). Some consequences of cryptographical conjectures for S 12 and EF. In: Leivant, D. (eds) Logic and Computational Complexity. LCC 1994. Lecture Notes in Computer Science, vol 960. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60178-3_86
Download citation
DOI: https://doi.org/10.1007/3-540-60178-3_86
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60178-4
Online ISBN: 978-3-540-44720-7
eBook Packages: Springer Book Archive