[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Map of Witness Maps: New Definitions and Connections

  • Conference paper
  • First Online:
Public-Key Cryptography – PKC 2023 (PKC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13941))

Included in the following conference series:

  • 744 Accesses

Abstract

A witness map deterministically maps a witness w of some NP statement x into computationally sound proof that x is true, with respect to a public common reference string (CRS). In other words, it is a deterministic, non-interactive, computationally sound proof system in the CRS model. A unique witness map (UWM) ensures that for any fixed statement x, the witness map should output the same unique proof for x, no matter what witness w it is applied to. More generally a compact witness map (CWM) can only output one of at most \(2^\alpha \) proofs for any given statement x, where \(\alpha \) is some compactness parameter. Such compact/unique witness maps were proposed recently by Chakraborty, Prabhakaran and Wichs (PKC ’20) as a tool for building tamper-resilient signatures, who showed how to construct UWMs from indistinguishability obfuscation (iO). In this work, we study CWMs and UWMs as primitives of independent interest and present a number of interesting connections to various notions in cryptography.

  • First, we show that UWMs lie somewhere between witness PRFs (Zhandry; TCC ’16) and iO – they imply the former and are implied by the latter. In particular, we show that a relaxation of UWMs to the “designated verifier (dv-UWM)” setting is equivalent to witness PRFs. Moreover, we consider two flavors of such dv-UWMs, which correspond to two flavors of witness PRFs previously considered in the literature, and show that they are all in fact equivalent to each other in terms of feasibility.

  • Next, we consider CWMs that are extremely compact, with \(\alpha = O(\log \kappa )\), where \(\kappa \) is the security parameter. We show that such CWMs imply pseudo-UWMs where the witness map is allowed to be pseudo-deterministic – i.e., for every true statement x, there is a unique proof such that, on any witness w, the witness map outputs this proof with \(1-1/p(\lambda )\) probability, for a polynomial p that we can set arbitrarily large.

  • Lastly, we consider CWMs that are mildly compact, with \(\alpha = p(\lambda )\) for some a-priori fixed polynomial p, independent of the length of the statement x or witness w. Such CWMs are implied by succinct non-interactive arguments (SNARGs). We show that such CWMs imply NIZKs, and therefore lie somewhere between NIZKs and SNARGs.

S. Chakraborty—Work done while the author was at ETH Zurich.

M. Prabhakaran—Supported by the IITB Trust Lab.

D. Wichs—Research supported by NSF grant CNS-1750795, CNS-2055510, the Alfred P. Sloan Research Fellowship.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Informally, a \(\lambda \)-BLR-wPRF \(F_K(\cdot )\) guarantees pseudorandomness of the output of the PRF when evaluated on uniformly random inputs, even when the adversary can leak up to \(\lambda \) bits on K. [9] showed how to construct such BLR-wPRF from any OWF.

  2. 2.

    Informally, a \(\lambda \)-entropic leakage-resilient PRF \(F_K(\cdot )\) guarantees pseudorandomness of the output of the PRF when evaluated on uniformly random inputs, even when the adversary can get \(\lambda \)-entropic leakage on K. Roughly this means that the PRF key K still has \(k - \lambda \) bits of average min-entropy, even conditioned on the leakage from K. [9] showed how to construct such entropic LR-wPRF from any OWF.

  3. 3.

    Note that, the language \(L_R:= \{ x \mid \exists w, (x,w)\in R \}\).

References

  1. Beigel, R.: On the relativized power of additional accepting paths. In: Proceedings: Fourth Annual Structure in Complexity Theory Conference, University of Oregon, Eugene, Oregon, USA, 19–22 June 1989, pp. 216–224. IEEE Computer Society (1989)

    Google Scholar 

  2. Beigel, R., Buhrman, H., Fortnow, L.: NP might not be as easy as detecting unique solutions. In: Scott Vitter, J. (ed.) Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, 23–26 May 1998, pp. 203–208. ACM (1998)

    Google Scholar 

  3. Boyle, E., Segev, G., Wichs, D.: Fully leakage-resilient signatures. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 89–108. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_7

    Chapter  Google Scholar 

  4. Chakraborty, S., Prabhakaran, M., Wichs, D.: Witness maps and applications. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC 2020. Part I, volume 12110 of LNCS, pp. 220–246. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-45374-9_8

    Chapter  Google Scholar 

  5. Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: 51st FOCS, pp. 511–520. IEEE Computer Society Press (2010)

    Google Scholar 

  6. Gat, E., Goldwasser, S.: Probabilistic search algorithms with unique answers and their cryptographic applications. Electron. Colloquium Comput. Complex TR11, 136 (2011)

    Google Scholar 

  7. Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, pp. 25–32. ACM Press (1989)

    Google Scholar 

  8. Goldwasser, S., Grossman, O., Holden, D.: Pseudo-deterministic proofs. In: Karlin, A.R. (ed.) ITCS 2018, volume 94 of LIPIcs, pp. 1–18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2018)

    Google Scholar 

  9. Hazay, C., López-Alt, A., Wee, H., Wichs, D.: Leakage-resilient cryptography from minimal assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 160–176. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_10

    Chapter  Google Scholar 

  10. Kitagawa, F., Matsuda, T., Yamakawa, T.: NIZK from SNARG. In: Pass, R., Pietrzak, K. (eds.) TCC 2020. Part I, volume 12550 of LNCS, pp. 567–595. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-64375-1_20

    Chapter  Google Scholar 

  11. Lin, H., Pass, R., Seth, K., Telang, S.: Indistinguishability obfuscation with non-trivial efficiency. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. Part II, volume 9615 of LNCS, pp. 447–462. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49387-8_17

    Chapter  Google Scholar 

  12. Liu, Y., Pass, R.: On one-way functions and Kolmogorov complexity. In: 61st FOCS, pp. 1243–1254. IEEE Computer Society Press (2020)

    Google Scholar 

  13. Rackoff, C.: Relativized questions involving probabilistic algorithms. J. ACM 29(1), 261–268 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  14. Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 475–484. ACM Press (2014)

    Google Scholar 

  15. Valiant, L.G.: Relative complexity of checking and evaluating. Inf. Process. Lett. 5(1), 20–23 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  16. Valiant, L.G., Vazirani, V.V.: NP is as easy as detecting unique solutions. Theor. Comput. Sci. 47(3), 85–93 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  17. Zhandry, M.: How to avoid obfuscation using witness PRFs. In: Kushilevitz, E., Malkin, T. (eds.) TCC 2016-A. Part II, volume 9563 of LNCS, pp. 421–448. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49099-0_16

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suvradip Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chakraborty, S., Prabhakaran, M., Wichs, D. (2023). A Map of Witness Maps: New Definitions and Connections. In: Boldyreva, A., Kolesnikov, V. (eds) Public-Key Cryptography – PKC 2023. PKC 2023. Lecture Notes in Computer Science, vol 13941. Springer, Cham. https://doi.org/10.1007/978-3-031-31371-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31371-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31370-7

  • Online ISBN: 978-3-031-31371-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics