Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-030-64381-2_11guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Lower Bounds on the Time/Memory Tradeoff of Function Inversion

Published: 09 December 2020 Publication History

Abstract

We study time/memory tradeoffs of function inversion: an algorithm, i.e., an inverter, equipped with an s-bit advice on a randomly chosen function and using q oracle queries to f, tries to invert a randomly chosen output y of f, i.e., to find . Much progress was done regarding adaptive function inversion—the inverter is allowed to make adaptive oracle queries. Hellman [IEEE transactions on Information Theory ’80] presented an adaptive inverter that inverts with high probability a random f. Fiat and Naor [SICOMP ’00] proved that for any sq with (ignoring low-order terms), an s-advice, q-query variant of Hellman’s algorithm inverts a constant fraction of the image points of any function. Yao [STOC ’90] proved a lower bound of for this problem. Closing the gap between the above lower and upper bounds is a long-standing open question.
Very little is known of the non-adaptive variant of the question—the inverter chooses its queries in advance. The only known upper bounds, i.e., inverters, are the trivial ones (with ), and the only lower bound is the above bound of Yao. In a recent work, Corrigan-Gibbs and Kogan [TCC ’19] partially justified the difficulty of finding lower bounds on non-adaptive inverters, showing that a lower bound on the time/memory tradeoff of non-adaptive inverters implies a lower bound on low-depth Boolean circuits. Bounds that, for a strong enough choice of parameters, are notoriously hard to prove.
We make progress on the above intriguing question, both for the adaptive and the non-adaptive case, proving the following lower bounds on restricted families of inverters:
Linear-advice (adaptive inverter).
If the advice string is a linear function of f (e.g., for some matrix A, viewing f as a vector in ), then . The bound generalizes to the case where the advice string of, i.e., the coordinate-wise addition of the truth tables of and, can be computed from the description of and by a low communication protocol.
Affine non-adaptive decoders.
If the non-adaptive inverter has an affine decoder—it outputs a linear function, determined by the advice string and the element to invert, of the query answers—then (regardless of q).
Affine non-adaptive decision trees.
If the non-adaptive inversion algorithm is a d-depth affine decision tree—it outputs the evaluation of a decision tree whose nodes compute a linear function of the answers to the queries—and for some universal, then .

References

[1]
Abusalah H, Alwen J, Cohen B, Khilko D, Pietrzak K, and Reyzin L Takagi T and Peyrin T Beyond hellman’s time-memory trade-offs with applications to proofs of space Advances in Cryptology – ASIACRYPT 2017 2017 Cham Springer 357-379
[2]
Akshima, D., Cash, A., Drucker, H., Wee, et al.: Time-space tradeoffs and short collisions in merkle-damgård hash functions. In: Annual International Cryptology Conference (CRYPTO), pp. 157–186 (2020)
[3]
Alon N, Balla I, Gishboliner L, Mond A, and Mousset F The minrank of random graphs over arbitrary fields Isr. J. Math. 2019 235 1 63-77
[4]
Bar-Yossef Z, Birk Y, Jayram T, and Kol T Index coding with side information IEEE Trans. Inform. Theor. 2011 57 3 1479-1494
[5]
Biryukov A and Shamir A Okamoto T Cryptanalytic time/memory/data tradeoffs for stream ciphers Advances in Cryptology — ASIACRYPT 2000 2000 Heidelberg Springer 1-13
[6]
Biryukov A, Shamir A, and Wagner D Goos G, Hartmanis J, van Leeuwen J, and Schneier B Real time cryptanalysis of A5/1 on a PC Fast Software Encryption 2001 Heidelberg Springer 1-18
[7]
Chawin, D., Haitner, I., Mazor, N.: Lower bounds on the time/memory tradeoff of function inversion. Technical report TR20-089, Electronic Colloquium on Computational Complexity (2020)
[8]
Coretti S, Dodis Y, Guo S, and Steinberger J Nielsen JB and Rijmen V Random oracles and non-uniformity Advances in Cryptology – EUROCRYPT 2018 2018 Cham Springer 227-258
[9]
Corrigan-Gibbs H and Kogan D Hofheinz D and Rosen A The function-inversion problem: barriers and opportunities Theory of Cryptography 2019 Cham Springer 393-421
[10]
De A, Trevisan L, and Tulsiani M Rabin T Time space tradeoffs for attacks against one-way functions and PRGs Advances in Cryptology – CRYPTO 2010 2010 Heidelberg Springer 649-665
[11]
Dodis Y, Guo S, and Katz J Coron J and Nielsen JB Fixing cracks in the concrete: random oracles with auxiliary input, revisited Advances in Cryptology – EUROCRYPT 2017 2017 Cham Springer 473-495
[12]
Fiat A and Naor M Rigorous time-space trade-offs for inverting functions SIAM J. Comput. 2000 29 3 790-803
[13]
Galvin, D.: Three tutorial lectures on entropy and counting. Technical report 1406.7872, arXiv (2014)
[14]
Gennaro R, Gertner Y, Katz J, and Trevisan L Bounds on the efficiency of generic cryptographic constructions SIAM J. Comput. 2005 35 1 217-246
[15]
Golovnev A, Regev O, and Weinstein O The minrank of random graphs IEEE Trans. Inform. Theor. 2018 64 11 6990-6995
[16]
Haviv, I., Langberg, M.: On linear index coding for random graphs. In: 2012 IEEE International Symposium on Information Theory Proceedings, pp. 2231–2235. IEEE (2012)
[17]
Hellman M A cryptanalytic time-memory trade-off IEEE Trans. Inform. Theor. 1980 26 4 401-406
[18]
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Annual ACM Symposium on Theory of Computing (STOC), pp. 44–61 (1989)
[19]
Lubetzky E and Stav U Nonlinear index coding outperforming the linear optimum IEEE Trans. Inform. Theor. 2009 55 8 3544-3551
[20]
Oechslin P Boneh D Making a faster cryptanalytic time-memory trade-Off Advances in Cryptology - CRYPTO 2003 2003 Heidelberg Springer 617-630
[21]
Razborov AA On the distributional complexity of disjointness Theor. Comput. Sci. 1992 106 2 385-390
[22]
Unruh D Menezes A Random oracles and auxiliary input Advances in Cryptology - CRYPTO 2007 2007 Heidelberg Springer 205-223
[23]
Valiant LG Gruska J Graph-theoretic arguments in low-level complexity Mathematical Foundations of Computer Science 1977 1977 Heidelberg Springer 162-176
[24]
Valiant LG Why is boolean complexity theory difficult Boolean Funct. Complex. 1992 169 84-94
[25]
Yao AC Should tables be sorted? J. ACM 1981 28 3 615-628
[26]
Yao, A.C.: Protocols for secure computations. In: Annual Symposium on Foundations of Computer Science (FOCS), pp. 160–164 (1982)
[27]
Yao, A.C.: Coherent functions and program checkers. In: Annual ACM Symposium on Theory of Computing (STOC), pp. 84–94 (1990)

Cited By

View all
  • (2024)Beating Brute Force for Compression ProblemsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649778(659-670)Online publication date: 10-Jun-2024
  • (2024)Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman ProblemProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649752(1739-1749)Online publication date: 10-Jun-2024

Index Terms

  1. Lower Bounds on the Time/Memory Tradeoff of Function Inversion
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III
        Nov 2020
        669 pages
        ISBN:978-3-030-64380-5
        DOI:10.1007/978-3-030-64381-2

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 09 December 2020

        Author Tags

        1. Function inverters
        2. Random functions
        3. Time/memory tradeoff

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 02 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Beating Brute Force for Compression ProblemsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649778(659-670)Online publication date: 10-Jun-2024
        • (2024)Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman ProblemProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649752(1739-1749)Online publication date: 10-Jun-2024

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media