Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P ≠NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom functions is secure against at least two adaptive queries must falsify the decisional Diffie-Hellman assumption, a standard assumption from public-key cryptography. Hence proving any of this two seemingly unrelated statements would require a significant breakthrough. We show that at least one of the two statements is true.
To our knowledge this gives the first positive cryptographic result (namely that composition implies some weak adaptive security) which holds in Minicrypt, but not in Cryptomania, i.e. under the assumption that one-way functions exist, but public-key cryptography does not.
KeywordsSequential Composition Security Parameter Oblivious Transfer Pseudorandom Function Random Coin
- 3.Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The Relationship between Public Key Encryption and Oblivious Transfer. In: FOCS, pp. 325–335 (2000)Google Scholar
- 5.Harnik, D., Naor, M.: On the Compressibility of NP instances and Cryptographic Applications (manuscript, 2005)Google Scholar
- 6.Holenstein, T.: Personal Communication (2005)Google Scholar
- 7.Holenstein, T.: Immunization of key-agreement schemes, PhD.thesis. PhD thesis, ETH Zürich (to appear, 2006)Google Scholar
- 8.Impagliazzo, R.: A personal view of average-case complexity. In: Structure in Complexity Theory Conference, pp. 134–147 (1995)Google Scholar
- 9.Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-way Permutations. In: Proc, 21th ACM Symposium on the Theory of Computing (STOC), pp. 44–61 (1989)Google Scholar
- 11.Maurer, U., Pietrzak, K., Renner, R.: Indistinguishability Amplification (manuscript, 2006)Google Scholar
- 15.Rudich, S.: The use of interaction in public cryptosystems (extended abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 242–251. Springer, Heidelberg (1992)Google Scholar