Finding collisions in interactive protocols - Tight lower bounds on the round and communication complexities of statistically hiding commitments

Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev

Research output: Contribution to journalArticlepeer-review

34 Scopus citations

Abstract

We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon [Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Comput. Sci. 1403, Springer, Berlin, 1998, pp. 334-345] to the setting of interactive protocols and the reconstruction paradigm of Gennaro and Trevisan [Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS), IEEE Press, Piscataway, NJ, 2000, pp. 305-313].

Original languageEnglish
Pages (from-to)193-242
Number of pages50
JournalSIAM Journal on Computing
Volume44
Issue number1
DOIs
StatePublished - 2015

Funding

FundersFunder number
Israel Science Foundation1076/11, 483/13
Seventh Framework Programme
United States-Israel Binational Science Foundation2010196
Horizon 2020 Framework Programme638121

    Keywords

    • Black-box impossibility results
    • One-way functions
    • Private information retrieval
    • Statistically hiding commitments

    Fingerprint

    Dive into the research topics of 'Finding collisions in interactive protocols - Tight lower bounds on the round and communication complexities of statistically hiding commitments'. Together they form a unique fingerprint.

    Cite this