skip to main content
10.1145/1132516.1132614acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

On basing one-way functions on NP-hardness

Published:21 May 2006Publication History

ABSTRACT

We consider the possibility of basing one-way functions on NP-Hardness; that is, we study possible reductions from a worst-case decision problem to the task of average-case inverting a polynomial-time computable function f. Our main findings are the following two negative results:

  • If given y one can efficiently compute |f-1(y)| then the existence of a (randomized) reduction of NP to the task of inverting f implies that coNP ⊆ AM. Thus, it follows that such reductions cannot exist unless coNP ⊆ AM.

  • For any function f, the existence of a (randomized) non-adaptive reduction of NP to the task of average-case inverting f implies that coNP ⊆ AM.

Our work builds upon and improves on the previous works of Feigenbaum and Fortnow (SIAM Journal on Computing, 1993) and Bogdanov and Trevisan (44th FOCS, 2003), while capitalizing on the additional "computational structure" of the search problem associated with the task of inverting polynomial-time computable functions. We believe that our results illustrate the gain of directly studying the context of one-way functions rather than inferring results for it from a the general study of worst-case to average-case reductions.

References

  1. D. Aharonov and O. Regev. Lattice Problems in NP intersect coNP. In 45th FOCS, 2004.Google ScholarGoogle Scholar
  2. W. Aiello and J. Hastad. Perfect Zero-Knowledge Languages can be Recognized in Two Rounds. In 28th FOCS, pages 439--448, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Ajtai. Generating hard instances of lattice problems. In 28th STOC, pages 99--108, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Akavia, O. Goldreich, S. Goldwasser, and D. Moshkovitz. On Basing One-Way Functions on NP-Hardness. In preparations, to be posted on ECCC.Google ScholarGoogle Scholar
  5. L. Babai. Trading Group Theory for Randomness. In 17th STOC, pages 421--429, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Babai and S. Moran. Arthur-Merlin Games: A Randomized Proof System and a Hierarchy of Complexity Classes. JCSS, Vol. 36, pp. 254--276, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Babai and S. Laplante. Stronger seperations for random-self-reducability, rounds, and advice. In IEEE Conference on Computational Complexity 1999, pages 98--104, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Barak. How to Go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106--115, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Barak. Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model. In 43th FOCS, pages 345--355, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Ben-David, B. Chor, O. Goldreich, and M. Luby. On the Theory of Average Case Complexity. JCSS, Vol. 44, No. 2, April 1992, pages 193--219. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SICOMP, Vol. 13, pages 850--864, 1984. Preliminary version in 23rd FOCS, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Bogdanov and L. Trevisan. On worst-case to average-case reductions for NP problems. In 44th FOCS, pages 308--317, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Brassard. Relativized Cryptography. In 20th FOCS, pages 383--391, 1979.Google ScholarGoogle Scholar
  14. G. Di-Crescenzo and R. Impagliazzo. Security-preserving hardness-amplification for any regular one-way function In 31st STOC, pages 169--178, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Even, A.L. Selman, and Y. Yacobi. The Complexity of Promise Problems with Applications to Public-Key Cryptography. Inform. and Control, Vol. 61, pages 159--173, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Feigenbaum and L. Fortnow. Random self-reducibility of complete sets. SICOMP, Vol. 22, pages 994--1005, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Feigenbaum, L. Fortnow, C. Lund, and D. Spielman. The power of adaptiveness and additional queries in random self-reductions. Computational Complexity, 4:158--174, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Fortnow, The Complexity of Perfect Zero-Knowledge. In {28}, pages 327--343, 1989. Extended abstract in 19th STOC, pages 204--209, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. O. Goldreich. Foundation of Cryptography -- Basic Tools. Cambridge University Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. O. Goldreich, R. Impagliazzo, L.A. Levin, R. Venkatesan, and D. Zuckerman. Security Preserving Amplification of Hardness. In 31st FOCS, pages 318--326, 1990.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. O. Goldreich, H. Krawczyk and M. Luby. On the Existence of Pseudorandom Generators. SICOMP, Vol. 22, pages 1163--1175, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. O. Goldreich, S. Vadhan and A. Wigderson. On interactive proofs with a laconic provers. Computational Complexity, Vol. 11, pages 1--53, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Goldwasser and M. Sipser. Private Coins versus Public Coins in Interactive Proof Systems. In {28}, pages 73--90, 1989. Extended abstract in 18th STOC, pages 59--68, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. I. Haitner, O. Horvitz, J. Katz, C.Y. Koo, R. Morselli, and R. Shaltiel. Reducing complexity assumptions for statistically-hiding commitment. In Eurocrypt, Springer, LNCS3494, pages 58--77, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. E. Hemaspaandra, A.V. Naik, M. Ogiwara, and A.L. Selman. P-Selective Sets, and Reducing Search to Decision vs. Self-reducibility. JCSS, Vol. 53 (2), pages 194--209, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Hastad, R. Impagliazzo, L.A. Levin and M. Luby. A Pseudorandom Generator from any One-way Function. SICOMP, Vol. 28, pages 1364--1396, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Impagliazzo and L.A. Levin. No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random. In 31st FOCS, 1990, pages 812--821.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Katz and L. Trevisan. On The Efficiency Of Local Decoding Procedures For Error-Correcting Codes. In 32nd STOC, pages 80--86, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Micali, editor. Advances in Computing Research: a research annual, Vol. 5 (Randomness and Computation), 1989.Google ScholarGoogle Scholar
  30. D. Micciancio and O. Regev. Worst-case to Average-case Reductions Based on Gaussian Measures. In 45th FOCS, pages 372--381, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A.C. Yao. Theory and Application of Trapdoor Functions. In 23rd FOCS, pages 80--91, 1982.Google ScholarGoogle Scholar

Index Terms

  1. On basing one-way functions on NP-hardness

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '06: Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing
          May 2006
          786 pages
          ISBN:1595931341
          DOI:10.1145/1132516

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 May 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader