#### DMCA

## Cryptographic Complexity Classes and Computational Intractability Assumptions

by Unknown Authors

by Unknown Authors

@MISC{_cryptographiccomplexity,

author = {},

title = {Cryptographic Complexity Classes and Computational Intractability Assumptions},

year = {}

}

Which computational intractability assumptions are inherent to cryptography? We present a broad framework to pose and investigate this question. We first aim to understand the “cryptographic complexity ” of various tasks, independent of any computational assumptions. In our framework the cryptographic tasks are modeled as multi-party computation functionalities. We consider a universally composable secure protocol for one task given access to another task as the most natural complexity reduction between the two tasks. Some of these cryptographic complexity reductions are unconditional, others are unconditionally impossible, but the vast majority appear to depend on computational assumptions; it is this relationship with computational assumptions that we study. In our detailed investigation of large classes of 2-party functionalities, we find that every reduction we are able to classify turns out to be unconditionally true or false, or else equivalent to the existence of one-way functions (OWF) or of semi-honest (equivalently, standalone-secure) oblivious transfer protocols (sh-OT). This leads us to conjecture that there are only a small finite number of distinct computational assumptions that are inherent among the infinite number of different cryptographic reductions in our framework. If indeed only a few computational intractability assumptions manifest in this framework, we propose that they are of an extraordinarily fundamental nature, since the framework contains a large variety of cryptographic tasks, and was formulated without regard to any of the prevalent computational intractability assumptions.

computational intractability assumption cryptographic complexity class computational assumption cryptographic task cryptographic complexity detailed investigation infinite number large class multi-party computation functionality prevalent computational intractability assumption various task vast majority different cryptographic reduction large variety small finite number distinct computational assumption extraordinarily fundamental nature one-way function oblivious transfer protocol composable secure protocol broad framework 2-party functionality natural complexity reduction cryptographic complexity reduction

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University