TY - JOUR
T1 - Finding collisions in interactive protocols - Tight lower bounds on the round and communication complexities of statistically hiding commitments
AU - Haitner, Iftach
AU - Hoch, Jonathan J.
AU - Reingold, Omer
AU - Segev, Gil
N1 - Publisher Copyright:
© 2015 Society for Industrial and Applied Mathematics.
PY - 2015
Y1 - 2015
N2 - We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon [Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Comput. Sci. 1403, Springer, Berlin, 1998, pp. 334-345] to the setting of interactive protocols and the reconstruction paradigm of Gennaro and Trevisan [Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS), IEEE Press, Piscataway, NJ, 2000, pp. 305-313].
AB - We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon [Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Comput. Sci. 1403, Springer, Berlin, 1998, pp. 334-345] to the setting of interactive protocols and the reconstruction paradigm of Gennaro and Trevisan [Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS), IEEE Press, Piscataway, NJ, 2000, pp. 305-313].
KW - Black-box impossibility results
KW - One-way functions
KW - Private information retrieval
KW - Statistically hiding commitments
UR - http://www.scopus.com/inward/record.url?scp=84923826727&partnerID=8YFLogxK
U2 - 10.1137/130938438
DO - 10.1137/130938438
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84923826727
SN - 0097-5397
VL - 44
SP - 193
EP - 242
JO - SIAM Journal on Computing
JF - SIAM Journal on Computing
IS - 1
ER -