PPP-Completeness with Connections to Cryptography

PPP-Completeness with Connections to Cryptography

2018 IEEE 59th Annual Symposium on Foundations of Computer Science PPP-Completeness with Connections to Cryptography Katerina Sotiraki Manolis Zampetakis Giorgos Zirdelis EECS and CSAIL EECS and CSAIL CCIS MIT MIT Northeastern University Cambridge, USA Cambridge, USA Boston, USA [email protected] [email protected] [email protected] Abstract—Polynomial Pigeonhole Principle (PPP) is an im- the definition of FNP inadequate to capture the intrinsic portant subclass of TFNP with profound connections to complexity of total problems in the appropriate way as it the complexity of the fundamental cryptographic primitives: was first shown in [1]. Moreover, there were evidences for collision-resistant hash functions and one-way permutations. In contrast to most of the other subclasses of TFNP, no complete the hardness of total search problems e.g. in [3]. Megiddo problem is known for PPP. Our work identifies the first PPP- and Papadimitriou [4] defined the class TFNP that contains complete problem without any circuit or Turing Machine given the total search problems of FNP, and Papadimitriou [2] explicitly in the input, and thus we answer a longstanding open proposed the following classification rule of problems in question from [Papadimitriou1994]. Specifically, we show that TFNP: constrained-SIS, a generalized version of the well-known Short Integer Solution problem (SIS) from lattice-based cryptogra- Total search problems should be classified in terms phy, is PPP-complete. of the profound mathematical principles that are In order to give intuition behind our reduction for invoked to establish their totality. constrained-SIS, we identify another PPP-complete problem TFNP with a circuit in the input but closely related to lattice problems. Along these lines, many subclasses for have been We call this problem BLICHFELDT and it is the computational defined. Johnson, Papadimitriou and Yannakakis [1] defined problem associated with Blichfeldt’s fundamental theorem in the class PLS. A few years later, Papadimitriou [2] defined the theory of lattices. the complexity classes PPA, PPAD, PPADS and PPP, Building on the inherent connection of PPP with collision- resistant hash functions, we use our completeness result to each one associated with a profound mathematical princi- construct the first natural hash function family that captures ple in accordance with the above classification rule. More the hardness of all collision-resistant hash functions in a worst- recently, the classes CLS and PWPP were defined in [5] case sense, i.e. it is natural and universal in the worst-case. The and [6], respectively. In Section I-A we give a high-level close resemblance of our hash function family with SIS, leads description of all these classes. us to the first candidate collision-resistant hash function that is both natural and universal in an average-case sense. Finding complete problems for the above classes is impor- Finally, our results enrich our understanding of the con- tant as it enhances our understanding of the underlying math- nections between PPP, lattice problems and other concrete ematical principles. In turn, such completeness results reveal cryptographic assumptions, such as the discrete logarithm equivalences between total search problems, that seemed problem over general groups. impossible to discover without invoking the definition of Keywords-complexity of total search problems; pigeonhole these classes. Since the definition of these classes in [1], [2] principle; collision resistant hash functions; short integer it was clear that the completeness results about problems solutions; that do not have explicitly a Turing machine or a circuit as I. INTRODUCTION a part of their input are of particular importance. For this reason it has been established to call such problems natural The fundamental task of Computational Complexity the- in the context of the complexity of total search problems ory is to classify computational problems according to their (see [7]). inherent computational difficulty. This led to the defini- Many natural complete problems are known for PLS tion of complexity classes such as NP which contains the and PPAD, and recently natural complete problems for decision problems with efficiently verifiable proofs in the PPA were identified too (see Section I-A). However, no “yes” instances. The search analog of the class NP, called natural complete problems are known for the classes PPP, FNP, is defined as the class of search problems whose PWPP that have profound connections with the hardness of decision version is in NP. The same definition extends to important cryptographic primitives, as we explain later in the class FP, as the search analog of P. The seminal works detail. of [1], [2] considered search problems in FNP that are total, i.e. their decision version is always affirmative and thus a Our Contributions. Our main contribution is to provide the solution must always exist. This totality property makes first natural complete problems for PPP and PWPP, and 2575-8454/18/$31.00 ©2018 IEEE 148 DOI 10.1109/FOCS.2018.00023 thus solve a longstanding open problem from [2]. Beyond 1) the computational problem BLICHFELDT associated that, our PPP completeness results lead the way towards with Blichfeldt’s theorem, which can be viewed as answering important questions in cryptography and lattice a generalization of Minkowski’s theorem, is PPP- theory as we highlight below. complete, 2) the cSIS problem, a constrained version of the Short UNIVERSAL COLLISION-RESISTANT HASH FUNCTION. SIS PPP PWPP Integer Solution ( ), is -complete, Building on the inherent connection of with 3) we combine known results and techniques from lattice collision-resistant hash functions, we construct a natural H theory to show that most approximation lattice prob- hash function family cSIS with the following properties: lems are reducible to BLICHFELDT and cSIS. - Worst-Case Universality. No efficient algorithm can These results create a new path towards a better under- H find a collision in every function of the family cSIS, standing of lattice problems in terms of complexity classes. unless worst-case collision-resistant hash functions do not exist. COMPLEXITY OF OTHER CRYPTOGRAPHIC ASSUMP- Moreover, if an (average-case hard) collision-resistant TIONS. Besides lattice problems, we discuss the relationship hash function family exists, then there exists an effi- of other well-studied cryptographic assumptions and PPP. ciently samplable distribution D over HcSIS, such that Additionally, we formulate a white-box variation of the (D, HcSIS) is an (average-case hard) collision-resistant generic group model for the discrete logarithm problem [27]; hash function family. we observe that this problem is in PPP and is another natural - Average-Case Hardness. No efficient algorithm can candidate for being PPP-complete. find a collision in a function chosen uniformly at random from HcSIS, unless we can efficiently find A. Related Work short lattice vectors in any (worst-case) lattice. In this section we discuss the previous work on the The first property of HcSIS is reminiscent of the existence complexity of total search problems, that has drawn attention of worst-case one-way functions from the assumption that from the theoretical computer science community over the P = NP [8]. The corresponding assumption for the existence past decades. We start with a high-level description of the of worst-case collision-resistance hash functions is assuming total complexity classes and then discuss the known results FP = PWPP, but our hash function family HcSIS is the first for each one of them. natural definition that does not involve circuits, and admits PLS. The class of problems whose totality is established this strong completeness guarantee in the worst-case. using a potential function argument. H The construction and properties of cSIS lead us to the Every finite directed acyclic graph has a sink. first candidate of a natural and universal collision-resistant PPA. The class of problems whose totality is proved hash function family. The idea of universal constructions through a parity argument. of cryptographic primitives was initiated by Levin in [9], Any finite graph has an even number of odd-degree who constructed the first universal one-way function and nodes. followed up by [10], [11]. Using the same ideas we can PPAD. The class of problems whose totality is proved also construct a universal collision-resistant hash function through a directed parity argument. family as we describe in Appendix A. The constructed hash All directed graphs of degree two or less have an function though invokes in the input an explicit description even number of degree one nodes. of a Turing machine and hence it fails to be natural, with the PPP. The class of problems whose totality is proved definition of naturality that we described before. In contrast, through a pigeonhole principle argument. our candidate construction is natural, simple, and could have Any map from a set S to itself either is onto or practical applications. has a collision. COMPLEXITY OF LATTICE PROBLEMS IN PPP. The hard- Using the same spirit two more classes were defined after ness of lattice problems in NP ∩ coNP [12] has served as [2], in [5] and [6]. the foundation for numerous cryptographic constructions in CLS. The class of problems whose totality is established the past two decades. This line of work was initiated by using both a potential function argument and a the breakthrough work of Ajtai [13], and later developed parity argument. in a long series of works (e.g. [14], [15], [16], [17], [18], PWPP. The class of problems whose totality is proved [19], [20], [21], [22], [23], [24], [25], [26]). This wide use through a weak pigeonhole principle. of search (approximation) lattice problems further motivates Any map from a set S to a strict subset of S has their study. a collision. We make progress in understanding this important re- Recently, a syntactic analog PTFNP of the semantic class search front by showing that: TFNP has been defined in [28], and a complete problem for 149 first natural PPA-complete problem, without a circuit as part of the input, has been identified in [7].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us