Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3618260.3649701acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Open access

One-Way Functions and Zero Knowledge

Published: 11 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    The fundamental theorem of Goldreich, Micali, and Wigderson (J. ACM 1991) shows that the existence of a one-way function is sufficient for constructing computational zero knowledge (CZK) proofs for all languages in NP. We prove its converse, thereby establishing characterizations of one-way functions based on the worst-case complexities of zero knowledge. Specifically, we prove that the following are equivalent: - A one-way function exists. - NPCZK and NP is hard in the worst case. - CZK is hard in the worst case and the problem GapMCSP of approximating circuit complexity is in CZK. The characterization above also holds for statistical and computational zero-knowledge argument systems. We further extend this characterization to a proof system with knowledge complexity O(logn). In particular, we show that the existence of a one-way function is characterized by the worst-case hardness of CZK if GapMCSP has a proof system with knowledge complexity O(logn). We complement this result by showing that NP admits an interactive proof system with knowledge complexity ω(logn) under the existence of an exponentially hard auxiliary-input one-way function (which is a weaker primitive than an exponentially hard one-way function). We also characterize the existence of a robustly-often nonuniformly computable one-way function by the nondeterministic hardness of CZK under the weak assumption that PSPACEAM. We present two applications of our results. First, we simplify the proof of the recent characterization of a one-way function by NP-hardness of a meta-computational problem and the worst-case hardness of NP given by Hirahara (STOC’23). Second, we show that if NP has a laconic zero-knowledge argument system, then there exists a public-key encryption scheme whose security can be based on the worst-case hardness of NP. This improves previous results which assume the existence of an indistinguishable obfuscation.

    References

    [1]
    William Aiello and Johan Håstad. 1991. Statistical Zero-Knowledge Languages can be Recognized in Two Rounds. J. Comput. Syst. Sci., 42, 3 (1991), 327–345. https://doi.org/10.1016/0022-0000(91)90006-Q
    [2]
    Eric Allender and Shuichi Hirahara. 2019. New Insights on the (Non-)Hardness of Circuit Minimization and Related Problems. TOCT, 11, 4 (2019), 27:1–27:27. https://doi.org/10.1145/3349616
    [3]
    Itay Berman, Akshay Degwekar, Ron D. Rothblum, and Prashant Nalini Vasudevan. 2018. From Laconic Zero-Knowledge to Public-Key Cryptography - Extended Abstract. In Proceedings of the International Cryptology Conference (CRYPTO). 674–697. https://doi.org/10.1007/978-3-319-96878-0_23
    [4]
    Avrim Blum, Merrick L. Furst, Michael J. Kearns, and Richard J. Lipton. 1993. Cryptographic Primitives Based on Hard Learning Problems. In Proceedings of the International Cryptology Conference (CRYPTO). 278–291. https://doi.org/10.1007/3-540-48329-2_24
    [5]
    Whitfield Diffie and Martin E. Hellman. 1976. New directions in cryptography. IEEE Trans. Information Theory, 22, 6 (1976), 644–654. https://doi.org/10.1109/TIT.1976.1055638
    [6]
    Lance Fortnow. 1989. The Complexity of Perfect Zero-Knowledge. Advances in Computing Research, 5 (1989), 327–343.
    [7]
    Oded Goldreich, Shafi Goldwasser, and Silvio Micali. 1986. How to construct random functions. J. ACM, 33, 4 (1986), 792–807. https://doi.org/10.1145/6490.6503
    [8]
    Oded Goldreich and Johan Håstad. 1998. On the Complexity of Interactive Proofs with Bounded Communication. Inf. Process. Lett., 67, 4 (1998), 205–214. https://doi.org/10.1016/S0020-0190(98)00116-1
    [9]
    Oded Goldreich, Silvio Micali, and Avi Wigderson. 1991. Proofs that Yield Nothing But Their Validity for All Languages in NP Have Zero-Knowledge Proof Systems. J. ACM, 38, 3 (1991), 691–729. https://doi.org/10.1145/116825.116852
    [10]
    Oded Goldreich and Erez Petrank. 1999. Quantifying Knowledge Complexity. Comput. Complex., 8, 1 (1999), 50–98. https://doi.org/10.1007/S000370050019
    [11]
    Shafi Goldwasser and Silvio Micali. 1984. Probabilistic Encryption. J. Comput. Syst. Sci., 28, 2 (1984), 270–299. https://doi.org/10.1016/0022-0000(84)90070-9
    [12]
    Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18, 1 (1989), 186–208. https://doi.org/10.1137/0218012
    [13]
    Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. 1999. A Pseudorandom Generator from any One-way Function. SIAM J. Comput., 28, 4 (1999), 1364–1396. https://doi.org/10.1137/S0097539793244708
    [14]
    Shuichi Hirahara. 2018. Non-Black-Box Worst-Case to Average-Case Reductions within NP. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 247–258. https://doi.org/10.1109/FOCS.2018.00032
    [15]
    Shuichi Hirahara. 2022. NP-Hardness of Learning Programs and Partial MCSP. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 968–979. https://doi.org/10.1109/FOCS54457.2022.00095
    [16]
    Shuichi Hirahara. 2023. Capturing One-Way Functions via NP-Hardness of Meta-Complexity. In Proceedings of the Symposium on Theory of Computing (STOC). 1027–1038. https://doi.org/10.1145/3564246.3585130
    [17]
    Shuichi Hirahara and Mikito Nanashima. 2023. Learning in Pessiland via Inductive Inference. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 447–457. https://doi.org/10.1109/FOCS57990.2023.00033
    [18]
    Shuichi Hirahara and Rahul Santhanam. 2022. Errorless versus Error-prone Average-case Complexity. In Proceedings of the Innovations in Theoretical Computer Science Conference (ITCS). 38:1–38:23.
    [19]
    Rahul Ilango. 2023. SAT Reduces to the Minimum Circuit Size Problem with a Random Oracle. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 733–742. https://doi.org/10.1109/FOCS57990.2023.00048
    [20]
    Rahul Ilango, Hanlin Ren, and Rahul Santhanam. 2022. Robustness of average-case meta-complexity via pseudorandomness. In Proceedings of the Symposium on Theory of Computing (STOC). 1575–1583. https://doi.org/10.1145/3519935.3520051
    [21]
    Russell Impagliazzo. 1995. A Personal View of Average-Case Complexity. In Proceedings of the Structure in Complexity Theory Conference. 134–147. https://doi.org/10.1109/SCT.1995.514853
    [22]
    Russell Impagliazzo and Leonid A. Levin. 1990. No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 812–821. https://doi.org/10.1109/FSCS.1990.89604
    [23]
    Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, and Eylon Yogev. 2014. One-Way Functions and (Im)Perfect Obfuscation. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 374–383. https://doi.org/10.1109/FOCS.2014.47
    [24]
    Richard J. Lipton and Neal E. Young. 1994. Simple strategies for large zero-sum games with applications to complexity theory. In Proceedings of the Symposium on Theory of Computing (STOC). 734–740. https://doi.org/10.1145/195058.195447
    [25]
    Yanyi Liu and Rafael Pass. 2020. On One-way Functions and Kolmogorov Complexity. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 1243–1254. https://doi.org/10.1109/FOCS46700.2020.00118
    [26]
    Yanyi Liu and Rafael Pass. 2023. On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity. Electron. Colloquium Comput. Complex., TR23-103 (2023), ECCC:TR23-103.
    [27]
    Mikito Nanashima. 2021. On Basing Auxiliary-Input Cryptography on NP-Hardness via Nonadaptive Black-Box Reductions. In Proceedings of the Innovations in Theoretical Computer Science Conference (ITCS). 29:1–29:15. https://doi.org/10.4230/LIPIcs.ITCS.2021.29
    [28]
    Moni Naor. 1991. Bit Commitment Using Pseudorandomness. J. Cryptol., 4, 2 (1991), 151–158. https://doi.org/10.1007/BF00196774
    [29]
    Moni Naor and Guy N. Rothblum. 2006. Learning to impersonate. In Proceedings of the International Conference on Machine Learning (ICML). 649–656. https://doi.org/10.1145/1143844.1143926
    [30]
    Minh-Huyen Nguyen, Shien Jin Ong, and Salil P. Vadhan. 2006. Statistical Zero-Knowledge Arguments for NP from Any One-Way Function. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 3–14. https://doi.org/10.1109/FOCS.2006.71
    [31]
    Shien Jin Ong and Salil P. Vadhan. 2007. Zero Knowledge and Soundness Are Symmetric. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). 187–209. https://doi.org/10.1007/978-3-540-72540-4_11
    [32]
    Rafail Ostrovsky. 1991. One-Way Functions, Hard on Average Problems, and Statistical Zero-Knowledge Proofs. In Proceedings of the Structure in Complexity Theory Conference. 133–138. https://doi.org/10.1109/SCT.1991.160253
    [33]
    Rafail Ostrovsky and Avi Wigderson. 1993. One-Way Fuctions are Essential for Non-Trivial Zero-Knowledge. In Proceedings of the Symposium on Theory of Computing (STOC). 3–17. https://doi.org/10.1109/ISTCS.1993.253489
    [34]
    Erez Petrank and Gábor Tardos. 2002. On the Knowledge Complexity of NP. Comb., 22, 1 (2002), 83–121. https://doi.org/10.1007/s004930200005
    [35]
    John Rompel. 1990. One-Way Functions are Necessary and Sufficient for Secure Signatures. In Proceedings of the Symposium on Theory of Computing (STOC). 387–394. https://doi.org/10.1145/100216.100269
    [36]
    Amit Sahai and Brent Waters. 2021. How to Use Indistinguishability Obfuscation: Deniable Encryption, and More. SIAM J. Comput., 50, 3 (2021), 857–908. https://doi.org/10.1137/15M1030108
    [37]
    Salil P. Vadhan. 2006. An Unconditional Study of Computational Zero Knowledge. SIAM J. Comput., 36, 4 (2006), 1160–1214. https://doi.org/10.1137/S0097539705447207

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of Computing
    June 2024
    2049 pages
    ISBN:9798400703836
    DOI:10.1145/3618260
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. interactive proof
    2. knowledge complexity
    3. one-way functions

    Qualifiers

    • Research-article

    Conference

    STOC '24
    Sponsor:
    STOC '24: 56th Annual ACM Symposium on Theory of Computing
    June 24 - 28, 2024
    BC, Vancouver, Canada

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 140
      Total Downloads
    • Downloads (Last 12 months)140
    • Downloads (Last 6 weeks)64
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media