Advertisement

An observation concerning the complexity of problems with few solutions and its application to cryptography

  • Shimon Even
  • Yacov Yacobi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 100)

Abstract

In this paper we state a hypothesis which is an extension of NP ≠ CoNP. We show that this new hypothesis implies the following statement: If a decision problem A is solvable by a Nondeterministic Turing Machine (NDTM) — M in polynomial time, and there is at most one computational path of M which leads to a ‘yes’ answer — then A is not NP-hard. We apply this result to Cryptography, and show that if our new hypothesis is true then a well designed cryptosystem, whose cracking problem is NP-hard, contains a large subproblem which is not NP-hard.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Brassard, G.: "A Note on the Complexity of Cryptography". IEEE Trans. on Inf. Th., Vol. IT-25, March 1979.Google Scholar
  2. [2]
    Shamir, A.: "On the Cryptocomplexity of Knapsack Systems". Proc. of the 11-th Annual ACM Symposium on Theory of Computing, Atlanta, Georgia, April 30–May 2, 1979.Google Scholar
  3. [3]
    Even, S. and Yacobi, Y.: "On the Cryptocomplexity of a Public Key System". Research Report, July 1979.Google Scholar
  4. [4]
    Aho, Hopcroft and Ullman: The Design and Analysis of Computer Algorithms. Addison Wesley, 1974.Google Scholar
  5. [5]
    Even, S.: Graph Algorithms, Computer Science Press, 1979.Google Scholar
  6. [6]
    Ginsburg, S.: Private communication.Google Scholar
  7. [7]
    Ullian, J.S.: "Partial Algorithm Problems for Context Free Languages". Information and Control, Vol. 11, 1967, pp. 80–101.Google Scholar
  8. [8]
    Shannon, C.E.: "Communication Theory of Secrecy Systems", Bell Systems Technical Journal, Vol. 28, October 1949, pp. 656–715.Google Scholar
  9. [9]
    Hellman, M.E.: "An Extension of the Shannon Theory Approach to Cryptography", IEEE Trans. on Inf. Th., Vol. IT-23, No. 3, May 1977.Google Scholar
  10. [10]
    Even, S. and Yacobi, Y.: "Cryptosystems which are NP-hard to break", Research Report, July 1979.Google Scholar
  11. [11]
    Rabin, M.O.: "Digitalized Signatures", Foundations of Secure Computation, New York Academic Press, 1978, pp. 155–168, edited by R.A. De Millo et al.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1981

Authors and Affiliations

  • Shimon Even
    • 1
  • Yacov Yacobi
    • 2
  1. 1.Computer Science Department, TechnionHaifaISRAEL
  2. 2.Electrical Engineering Department, TechnionHaifaISRAEL

Personalised recommendations