Cryptography in NC 0 (extended abstract)

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz

Research output: Contribution to journalConference articlepeer-review

104 Scopus citations

Abstract

We study the parallel time-complexity of basic crypto-graphic primitives such as one-way functions (OWFs) and pseudorandom generators (PRGs). Specifically, we study the possibility of computing instances of these primitives by NC 0 circuits, in which each output bit depends on a constant number of input bits. Despite previous efforts in this direction, there has been no significant theoretical evidence supporting this possibility, which was posed as an open question in several previous works. We essentially settle this question by providing over-whelming positive evidence for the possibility of cryptography in NC 0. Our main result is that every "moderately easy" OWF (resp., PRG), say computable in NC 1, can be compiled into a corresponding OWF (resp., low-stretch PRG) in NC 4 0, i. e. whose output bits each depend on at most 4 input bits. The existence of OWF and PRG in NC 1 is a relatively mild assumption, implied by most number-theoretic or algebraic intractability assumptions commonly used in cryptography. Hence, the existence of OWF and PRG in NC 0 follows from a variety of standard assumptions. A similar compiler can also be obtained for other cryptographic primitives such as one-way permutations, encryption, commitment, and collision-resistant hashing. The above results leave a small gap between the possibility of cryptography in NC 4 0 and the known impossibility of implementing even OWF in NC 2 0. We partially close this gap by providing evidence for the existence of OWF in NC 3 0. Finally, our techniques can also be applied to obtain unconditionally provable constructions of non-cryptographic PRGs. In particular, we obtain ε-biased generators in NC 3 0, resolving an open question posed by Mossel et al. [25], as well as a PRG for logspace in NC 0. Our results make use of the machinery of randomizing polynomials [19], which was originally motivated by questions in the domain of information-theoretic secure multi-party computation.

Original languageEnglish
Pages (from-to)166-175
Number of pages10
JournalProceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
StatePublished - 2004
EventProceedings - 45th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2004 - Rome, Italy
Duration: 17 Oct 200419 Oct 2004

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Cryptography in NC 0 (extended abstract)'. Together they form a unique fingerprint.

Cite this