TY - GEN
T1 - Cryptography from Planted Graphs
T2 - 21st International conference on Theory of Cryptography Conference, TCC 2023
AU - Abram, Damiano
AU - Beimel, Amos
AU - Ishai, Yuval
AU - Kushilevitz, Eyal
AU - Narayanan, Varun
N1 - Publisher Copyright:
© 2023, International Association for Cryptologic Research.
PY - 2023/1/1
Y1 - 2023/1/1
N2 - We study the following broad question about cryptographic primitives: is it possible to achieve security against arbitrary poly(n) -time adversary with O(log n) -size messages? It is common knowledge that the answer is “no” unless information-theoretic security is possible. In this work, we revisit this question by considering the setting of cryptography with public information and computational security. We obtain the following main results, assuming variants of well-studied intractability assumptions: A private simultaneous messages (PSM) protocol for every f: [ n] × [ n] → { 0, 1 } with (1 + ϵ) log n -bit messages, beating the known lower bound on information-theoretic PSM protocols. We apply this towards non-interactive secure 3-party computation with similar message size in the preprocessing model, improving over previous 2-round protocols.A secret-sharing scheme for any “forbidden-graph” access structure on n nodes with O(log n) share size.On the negative side, we show that computational threshold secret-sharing schemes with public information require share size Ω(log log n). For arbitrary access structures, we show that computational security does not help with 1-bit shares. The above positive results guarantee that any adversary of size no ( log n ) achieves an n- Ω ( 1 ) distinguishing advantage. We show how to make the advantage negligible by slightly increasing the asymptotic message size, still improving over all known constructions. The security of our constructions is based on the conjectured hardness of variants of the planted clique problem, which was extensively studied in the algorithms, statistical inference, and complexity theory communities. Our work provides the first applications of such assumptions to improving the efficiency of mainstream cryptographic primitives, gives evidence for the necessity of such assumptions, and suggests new questions in this domain that may be of independent interest.
AB - We study the following broad question about cryptographic primitives: is it possible to achieve security against arbitrary poly(n) -time adversary with O(log n) -size messages? It is common knowledge that the answer is “no” unless information-theoretic security is possible. In this work, we revisit this question by considering the setting of cryptography with public information and computational security. We obtain the following main results, assuming variants of well-studied intractability assumptions: A private simultaneous messages (PSM) protocol for every f: [ n] × [ n] → { 0, 1 } with (1 + ϵ) log n -bit messages, beating the known lower bound on information-theoretic PSM protocols. We apply this towards non-interactive secure 3-party computation with similar message size in the preprocessing model, improving over previous 2-round protocols.A secret-sharing scheme for any “forbidden-graph” access structure on n nodes with O(log n) share size.On the negative side, we show that computational threshold secret-sharing schemes with public information require share size Ω(log log n). For arbitrary access structures, we show that computational security does not help with 1-bit shares. The above positive results guarantee that any adversary of size no ( log n ) achieves an n- Ω ( 1 ) distinguishing advantage. We show how to make the advantage negligible by slightly increasing the asymptotic message size, still improving over all known constructions. The security of our constructions is based on the conjectured hardness of variants of the planted clique problem, which was extensively studied in the algorithms, statistical inference, and complexity theory communities. Our work provides the first applications of such assumptions to improving the efficiency of mainstream cryptographic primitives, gives evidence for the necessity of such assumptions, and suggests new questions in this domain that may be of independent interest.
UR - http://www.scopus.com/inward/record.url?scp=85178553633&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-48615-9_11
DO - 10.1007/978-3-031-48615-9_11
M3 - Conference contribution
AN - SCOPUS:85178553633
SN - 9783031486142
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 286
EP - 315
BT - Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings
A2 - Rothblum, Guy
A2 - Wee, Hoeteck
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 29 November 2023 through 2 December 2023
ER -