SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Gate Elimination for Linear Functions and new
Feebly Secure Constructions
Alex Davydow1 Sergey I. Nikolenko2
1St. Petersburg Academic University, ul. Khlopina, 8, korp. 3, St. Petersburg,
Russia, adavydow@yandex.ru
2Steklov Mathematical Institute, nab. r. Fontanka, 27, St. Petersburg, Russia,
sergey@logic.pdmi.ras.ru
CSR 2011
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Introduction
Our subject is public key cryptosystems.
No cryptosystem with public key has been proven to be secure.
If a secure public key cryptosystem exists then P = NP.
Moreover, asymptotic cryptography is kind of useless in
practice: you would be interested in specific key sizes.
To prove anything about specific key sizes, we have to talk
about circuit complexity.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Introduction
Of course, there are no nonlinear lower bounds in circuit
complexity.
But we can prove that feebly secure cryptosystems exist.
Nikolenko and Hirsch constructed trapdoor functions which
are 25
22 times harder to break then to use.
In this paper we will show an improvement of their
construction allowing us to build a protocol which is 5
4 harder
to break then to use.
From now on when speaking about complexity we will mean
general circuit complexity.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Definitions
Fix functions pi, ti, m, c : N → N. A feebly trapdoor candidate is a
sequence of triples of circuits C = {(Keyn, Evaln, Invn)}∞
n=1 where:
{Keyn}∞
n=1 is a family of sampling circuits
Keyn : Bn → Bpi(n) × Bti(n),
{Evaln}∞
n=1 is a family of evaluation circuits
Evaln : Bpi(n) × Bm(n) → Bc(n), and
{Invn}∞
n=1 is a family of inversion circuits
Invn : Bti(n) × Bc(n) → Bm(n)
such that for every security parameter n, every seed s ∈ Bn, and
every input m ∈ Bm(n)
Invn(Keyn,2(s), Evaln(Keyn,1(s), m)) = m,
where Keyn,1(s) and Keyn,2(s) are the first pi(n) bits (“public
information”) and the last ti(n) bits (“trapdoor information”) of
Keyn(s), respectively.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Definitions
A circuit N breaks a feebly trapdoor candidate
C = {Keyn, Evaln, Invn} on seed length n with probability r
if, for uniformly chosen seeds s ∈ Bn and inputs m ∈ Bm(n),
Pr
(s,m)∈U
N(Keyn,1(s), Evaln(Keyn,1(s), m)) = m > r.
A feebly trapdoor candidate C = {Keyn, Evaln, Invn} has
order of security k with level 3
4 if for every sequence of circuits
{Nn}∞
n=1 that break f on every input length n with probability
3
4,
lim inf
n→∞
min
C(Nn)
C(Keyn)
,
C(Nn)
C(Evaln)
,
C(Nn)
C(Invn)
≥ k.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Definitions
We will work with linear Boolean functions.
It is convenient to represent linear functions as matrices.
These functions are still interesting because the following
theorem holds:
Nonconstructive Bounds to Linear Functions
1 For every n there exists a constant δn such that the circuit
complexity of all linear functions φ : {0, 1}n
→ {0, 1}n
does not
exceed δn
n2
log n , and limn→∞ δn = 1.
2 For every n ≥ 3, there exists a linear Boolean function
φ : {0, 1}n
→ {0, 1}n
with circuit complexity greater than n2
2 log n .
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination
To build secure constructions we need a method to prove
lower bounds on complexity.
Gate elimination is virtually the only method we have to prove
lower bounds.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination
Consider a function f and a circuit of minimal size C that
computes it.
Now substitute some value c for some variable x thus
obtaining a circuit for the function f |x=c.
The original circuit C can now be simplified, because the
gates that had this variable as inputs become either unary or
constant.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions
Idea 1
Suppose that for n steps, there is at least one gate to eliminate.
Then C(f ) ≥ n.
Simple example: a function f that nontrivially depends on all
n inputs has C(f ) ≥ n − 1.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions
Gate Elimination 1
Suppose that P = {Pn}∞
n=1 is a series of predicates defined on
matrices over F2 with the following properties:
if P1(A) holds then C3/4(A) ≥ 1;
if Pn(A) holds then Pm(A) holds for every 1 ≤ m ≤ n;
if Pn(A) holds then, for every index i, Pn−1(A−i ) holds.
Then, for every matrix A with ≥ n + 1 different columns, if Pn(A)
holds for some n then C(A) ≥ n and, moreover, C3/4(A) ≥ n.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions (Generalized)
Idea 1 is not optimal because on each elimination step, we count
only one gate as eliminated, while sometimes we actually get two
or more.
Idea 2
Suppose that for n steps, there exists an input in the circuit with
two outgoing edges, and, moreover, in m of these cases both of
these edges go to a gate (rather than a gate and an output). Then
C(f ) ≥ n + m.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions (Generalized)
Gate Elimination 2
Suppose that predicates R = {Rn}∞
n=1 and Q = {Qm}∞
m=1 defined
on matrices over F2 have the following properties:
if R1(A) holds then C(A) ≥ 1;
if Rn(A) holds then Rk(A) holds for every 1 ≤ k ≤ n;
if Rn(A) holds then, for every i, Rn−1(A−i ) holds;
if Q1(A) holds then C(A) ≥ 1;
if Qm(A) holds then Qk(A) holds for every 1 ≤ k ≤ n;
if Qm(A) holds then, for every i, Qm−1(A−i ) holds;
if Qm(A) holds and A−i has more zero rows than A then
Qm(A−i ) holds.
Then, for every matrix A with ≥ n + 1 columns, all of whose
columns are different, if Rn(A) and Qm(A) hold for some n ≥ m
then C(A) ≥ n + m and, moreover, C3/4(A) ≥ n + m.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions (Generalized)
However, we are actually interested in the total number of
gates eliminated rather than specifically eliminating one gate
and two gates exactly (exact quantities and orderings may be
hard to find).
We call a nonzero entry unique if it is the only nonzero entry
in its row.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Gate Elimination for Linear Functions (Generalized)
Gate Elimination 3
Suppose that P = {Pn}∞
n=1 is a series of predicates defined on
matrices over F2 with the following properties:
if P1(A) holds then C(A) ≥ 1;
if Pn(A) holds then Pm(A) holds for every 1 ≤ m ≤ n;
if Pn(A) holds then, for every index i, if the ith column has no
unique entries then Pn−2(A−i ) holds, otherwise Pn−1(A−i )
holds.
Then, for every matrix A with ≥ n + 1 different columns, if Pn(A)
holds for some n then C(A) ≥ n and, moreover, C3/4(A) ≥ n.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Corollaries
Using Gate Elimination we can obtain several simple algorithms to
estimate complexity of linear Boolean functions.
Algorithm 1
Let t, u ≥ 1. Assume also that A is a matrix with all colums
different and, every row of A has at least u nonzero entries, and
after removing any t columns of A, the matrix still has at least one
row containing at least two nonzero entries. Then C(A) ≥ u + t
and, moreover, C3/4(A) ≥ u + t.
Algorithm 2
Let t ≥ u ≥ 2. Assume that A is a u × t matrix with different
columns, and each column of A has at least two nonzero elements
(ones). Then C(A) ≥ 2t − u and, moreover, C3/4(A) ≥ 2t − u.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Corollaries
While the first algorithm was introduced in Hirsch and
Nikolenko’s paper, the second is a new result.
It is very simple but has several interesting applications.
For example, with this idea we can build a matrix with
complexity 2n + n
log(n) −2log(n)−1. Example of such a matrix
is provided by cyclic shifts of Hamming code check matrices.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Block Diagonal Matrices
Block Diagonal Matrix Complexity
Suppose that a linear function χ is given by a block diagonal matrix


A1 0 ··· 0
0 A2 ··· 0
...
...
...
0 0 ··· Ak

 ,
and every Aj satisfies the conditions of Generalized Gate
Elimination method with predicates Pj = {Pj
n}∞
n=1, and Pj
nj (Aj )
hold for every j. Then C(χ) ≥
k
j=1
nj .
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
New Feebly Secure Construction
By Un, we denote the upper triangular square n × n matrix with a
bidiagonal inverse:
Un =
1 1 ··· 1
0 1 ··· 1
...
...
...
0 0 ··· 1
, U−1
n =
1 1 0 ··· 0
0 1 1 ··· 0
...
...
...
...
0 0 0 ··· 1
;
note that U2
n is an upper triangular matrix with zeros and ones
chequered. In what follows, we often write matrices that consist of
other matrices as blocks; e.g., ( Un Un ) is an n × 2n matrix
consisting of two upper triangular blocks.
1 C3/4(Un) = n − 1.
2 C3/4(U2
n ) = n − 2.
3 C3/4(U−1
n ) = n − 1.
4 C3/4(( Un Un )) = 2n − 1.
5 3n − 6 ≤ C3/4(( U2
n Un )) ≤ C(( U2
n Un )) ≤ 3n − 3.
6 3n − 4 ≤ C3/4(( Un U−1
n )) ≤ C(( Un U−1
n )) ≤ 3n − 2.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
New Feebly Secure Construction
We assume that lengths of public information pi, trapdoor
information ti, message m, and the cipher c are the same and
equal n.
We let ti = Un · pi, c = ( U−1
n Un ) · m
pi .
An adversary would have to compute the matrix
( Un Un ) · ( c
ti ) = ( Un U2
n ) · c
pi .
Problem
Inversion without the trapdoor is harder than inversion with
trapdoor, but encryption is about the same complexity as inversion
without trapdoor.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Solving the Problem
To solve this problem we will use a feebly one-way linear
function A (one of Hiltgen’s hard function with order of
security up to 2).
Their complexity follows from Algorithm 1, so we can stack
them up into a block matrix.
New protocol:
Keyn = Un 0
0 In
· ( s s ) = ti
pi
,
Evaln = U−1
n Un 0
0 0 A
·
m1
pi
m2
= ( c1
c2 ) ,
Invn = Un Un 0
0 0 A−1 ·
c1
ti
c2
= ( m1
m2 ) .
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Final Results
Complexities of new protocol:
C3/4(Keyn) = n − 1,
C3/4(Evaln) = 3n + λn + o(n),
C3/4(Invn) = 2n + (2 − )λn + o(n),
C3/4(Advn) = 3n + (2 − )λn + o(n).
The order of security of this construction is now:
lim
n→∞
min
C3/4(Advn)
C(Evaln)
,
C3/4(Advn)
C(Invn)
,
C3/4(Advn)
C(Keyn)
=
= min
3 + (2 − )λ
3 + λ
,
3 + (2 − )λ
2 + (2 − )λ
.
This expression reaches maximum for λ = 1
1− , and this
maximum is 5−4
4− , which tends to 5
4 as → 0.
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
Thank you!
Thank you for your attention!
Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions

Weitere ähnliche Inhalte

Was ist angesagt?

19. algorithms and-complexity
19. algorithms and-complexity19. algorithms and-complexity
19. algorithms and-complexity
ashishtinku
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
Aleksandr Yampolskiy
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Andrea Tassi
 
Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)
Joonyoung Yi
 

Was ist angesagt? (20)

013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
 
RSA cracking puzzle
RSA cracking puzzleRSA cracking puzzle
RSA cracking puzzle
 
Ch01 basic concepts_nosoluiton
Ch01 basic concepts_nosoluitonCh01 basic concepts_nosoluiton
Ch01 basic concepts_nosoluiton
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
Cyclic Attacks on the RSA Trapdoor Function
Cyclic Attacks on the RSA Trapdoor FunctionCyclic Attacks on the RSA Trapdoor Function
Cyclic Attacks on the RSA Trapdoor Function
 
Operational research
Operational researchOperational research
Operational research
 
Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report Digital signal Processing all matlab code with Lab report
Digital signal Processing all matlab code with Lab report
 
19. algorithms and-complexity
19. algorithms and-complexity19. algorithms and-complexity
19. algorithms and-complexity
 
Digital logic circuit
Digital logic circuitDigital logic circuit
Digital logic circuit
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Lecture5
Lecture5Lecture5
Lecture5
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Digitalcontrolsystems
DigitalcontrolsystemsDigitalcontrolsystems
Digitalcontrolsystems
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
 
Digital Electronics Question Bank
Digital Electronics Question BankDigital Electronics Question Bank
Digital Electronics Question Bank
 
Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)Exact Matrix Completion via Convex Optimization Slide (PPT)
Exact Matrix Completion via Convex Optimization Slide (PPT)
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion Presentation
 

Ähnlich wie Csr2011 june15 12_00_davydow

Paper computer
Paper computerPaper computer
Paper computer
bikram ...
 
Paper computer
Paper computerPaper computer
Paper computer
bikram ...
 

Ähnlich wie Csr2011 june15 12_00_davydow (20)

Line Segment Intersections
Line Segment IntersectionsLine Segment Intersections
Line Segment Intersections
 
Cs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyCs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer key
 
Brute force
Brute forceBrute force
Brute force
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
2007
20072007
2007
 
A review on reversible logic gates and their implementation
A review on reversible logic gates and their implementationA review on reversible logic gates and their implementation
A review on reversible logic gates and their implementation
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Answers withexplanations
Answers withexplanationsAnswers withexplanations
Answers withexplanations
 
Knowledge Engineering in FOL.
Knowledge Engineering in FOL.Knowledge Engineering in FOL.
Knowledge Engineering in FOL.
 
Cheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networksCheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networks
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法
 
algorithm Unit 3
algorithm Unit 3algorithm Unit 3
algorithm Unit 3
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Paper computer
Paper computerPaper computer
Paper computer
 
Paper computer
Paper computerPaper computer
Paper computer
 
residue
residueresidue
residue
 

Mehr von CSR2011

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigoriev
CSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
CSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
CSR2011
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudan
CSR2011
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avron
CSR2011
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilka
CSR2011
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyen
CSR2011
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskin
CSR2011
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remila
CSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
CSR2011
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blin
CSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
CSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
CSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
CSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
CSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
CSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
CSR2011
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminski
CSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
CSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
CSR2011
 

Mehr von CSR2011 (20)

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigoriev
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudan
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avron
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilka
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyen
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskin
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remila
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminski
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 

Csr2011 june15 12_00_davydow

  • 1. Gate Elimination for Linear Functions and new Feebly Secure Constructions Alex Davydow1 Sergey I. Nikolenko2 1St. Petersburg Academic University, ul. Khlopina, 8, korp. 3, St. Petersburg, Russia, adavydow@yandex.ru 2Steklov Mathematical Institute, nab. r. Fontanka, 27, St. Petersburg, Russia, sergey@logic.pdmi.ras.ru CSR 2011 Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 2. Introduction Our subject is public key cryptosystems. No cryptosystem with public key has been proven to be secure. If a secure public key cryptosystem exists then P = NP. Moreover, asymptotic cryptography is kind of useless in practice: you would be interested in specific key sizes. To prove anything about specific key sizes, we have to talk about circuit complexity. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 3. Introduction Of course, there are no nonlinear lower bounds in circuit complexity. But we can prove that feebly secure cryptosystems exist. Nikolenko and Hirsch constructed trapdoor functions which are 25 22 times harder to break then to use. In this paper we will show an improvement of their construction allowing us to build a protocol which is 5 4 harder to break then to use. From now on when speaking about complexity we will mean general circuit complexity. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 4. Definitions Fix functions pi, ti, m, c : N → N. A feebly trapdoor candidate is a sequence of triples of circuits C = {(Keyn, Evaln, Invn)}∞ n=1 where: {Keyn}∞ n=1 is a family of sampling circuits Keyn : Bn → Bpi(n) × Bti(n), {Evaln}∞ n=1 is a family of evaluation circuits Evaln : Bpi(n) × Bm(n) → Bc(n), and {Invn}∞ n=1 is a family of inversion circuits Invn : Bti(n) × Bc(n) → Bm(n) such that for every security parameter n, every seed s ∈ Bn, and every input m ∈ Bm(n) Invn(Keyn,2(s), Evaln(Keyn,1(s), m)) = m, where Keyn,1(s) and Keyn,2(s) are the first pi(n) bits (“public information”) and the last ti(n) bits (“trapdoor information”) of Keyn(s), respectively. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 5. Definitions A circuit N breaks a feebly trapdoor candidate C = {Keyn, Evaln, Invn} on seed length n with probability r if, for uniformly chosen seeds s ∈ Bn and inputs m ∈ Bm(n), Pr (s,m)∈U N(Keyn,1(s), Evaln(Keyn,1(s), m)) = m > r. A feebly trapdoor candidate C = {Keyn, Evaln, Invn} has order of security k with level 3 4 if for every sequence of circuits {Nn}∞ n=1 that break f on every input length n with probability 3 4, lim inf n→∞ min C(Nn) C(Keyn) , C(Nn) C(Evaln) , C(Nn) C(Invn) ≥ k. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 6. Definitions We will work with linear Boolean functions. It is convenient to represent linear functions as matrices. These functions are still interesting because the following theorem holds: Nonconstructive Bounds to Linear Functions 1 For every n there exists a constant δn such that the circuit complexity of all linear functions φ : {0, 1}n → {0, 1}n does not exceed δn n2 log n , and limn→∞ δn = 1. 2 For every n ≥ 3, there exists a linear Boolean function φ : {0, 1}n → {0, 1}n with circuit complexity greater than n2 2 log n . Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 7. Gate Elimination To build secure constructions we need a method to prove lower bounds on complexity. Gate elimination is virtually the only method we have to prove lower bounds. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 8. Gate Elimination Consider a function f and a circuit of minimal size C that computes it. Now substitute some value c for some variable x thus obtaining a circuit for the function f |x=c. The original circuit C can now be simplified, because the gates that had this variable as inputs become either unary or constant. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 9. Gate Elimination for Linear Functions Idea 1 Suppose that for n steps, there is at least one gate to eliminate. Then C(f ) ≥ n. Simple example: a function f that nontrivially depends on all n inputs has C(f ) ≥ n − 1. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 10. Gate Elimination for Linear Functions Gate Elimination 1 Suppose that P = {Pn}∞ n=1 is a series of predicates defined on matrices over F2 with the following properties: if P1(A) holds then C3/4(A) ≥ 1; if Pn(A) holds then Pm(A) holds for every 1 ≤ m ≤ n; if Pn(A) holds then, for every index i, Pn−1(A−i ) holds. Then, for every matrix A with ≥ n + 1 different columns, if Pn(A) holds for some n then C(A) ≥ n and, moreover, C3/4(A) ≥ n. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 11. Gate Elimination for Linear Functions (Generalized) Idea 1 is not optimal because on each elimination step, we count only one gate as eliminated, while sometimes we actually get two or more. Idea 2 Suppose that for n steps, there exists an input in the circuit with two outgoing edges, and, moreover, in m of these cases both of these edges go to a gate (rather than a gate and an output). Then C(f ) ≥ n + m. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 12. Gate Elimination for Linear Functions (Generalized) Gate Elimination 2 Suppose that predicates R = {Rn}∞ n=1 and Q = {Qm}∞ m=1 defined on matrices over F2 have the following properties: if R1(A) holds then C(A) ≥ 1; if Rn(A) holds then Rk(A) holds for every 1 ≤ k ≤ n; if Rn(A) holds then, for every i, Rn−1(A−i ) holds; if Q1(A) holds then C(A) ≥ 1; if Qm(A) holds then Qk(A) holds for every 1 ≤ k ≤ n; if Qm(A) holds then, for every i, Qm−1(A−i ) holds; if Qm(A) holds and A−i has more zero rows than A then Qm(A−i ) holds. Then, for every matrix A with ≥ n + 1 columns, all of whose columns are different, if Rn(A) and Qm(A) hold for some n ≥ m then C(A) ≥ n + m and, moreover, C3/4(A) ≥ n + m. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 13. Gate Elimination for Linear Functions (Generalized) However, we are actually interested in the total number of gates eliminated rather than specifically eliminating one gate and two gates exactly (exact quantities and orderings may be hard to find). We call a nonzero entry unique if it is the only nonzero entry in its row. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 14. Gate Elimination for Linear Functions (Generalized) Gate Elimination 3 Suppose that P = {Pn}∞ n=1 is a series of predicates defined on matrices over F2 with the following properties: if P1(A) holds then C(A) ≥ 1; if Pn(A) holds then Pm(A) holds for every 1 ≤ m ≤ n; if Pn(A) holds then, for every index i, if the ith column has no unique entries then Pn−2(A−i ) holds, otherwise Pn−1(A−i ) holds. Then, for every matrix A with ≥ n + 1 different columns, if Pn(A) holds for some n then C(A) ≥ n and, moreover, C3/4(A) ≥ n. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 15. Corollaries Using Gate Elimination we can obtain several simple algorithms to estimate complexity of linear Boolean functions. Algorithm 1 Let t, u ≥ 1. Assume also that A is a matrix with all colums different and, every row of A has at least u nonzero entries, and after removing any t columns of A, the matrix still has at least one row containing at least two nonzero entries. Then C(A) ≥ u + t and, moreover, C3/4(A) ≥ u + t. Algorithm 2 Let t ≥ u ≥ 2. Assume that A is a u × t matrix with different columns, and each column of A has at least two nonzero elements (ones). Then C(A) ≥ 2t − u and, moreover, C3/4(A) ≥ 2t − u. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 16. Corollaries While the first algorithm was introduced in Hirsch and Nikolenko’s paper, the second is a new result. It is very simple but has several interesting applications. For example, with this idea we can build a matrix with complexity 2n + n log(n) −2log(n)−1. Example of such a matrix is provided by cyclic shifts of Hamming code check matrices. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 17. Block Diagonal Matrices Block Diagonal Matrix Complexity Suppose that a linear function χ is given by a block diagonal matrix   A1 0 ··· 0 0 A2 ··· 0 ... ... ... 0 0 ··· Ak   , and every Aj satisfies the conditions of Generalized Gate Elimination method with predicates Pj = {Pj n}∞ n=1, and Pj nj (Aj ) hold for every j. Then C(χ) ≥ k j=1 nj . Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 18. New Feebly Secure Construction By Un, we denote the upper triangular square n × n matrix with a bidiagonal inverse: Un = 1 1 ··· 1 0 1 ··· 1 ... ... ... 0 0 ··· 1 , U−1 n = 1 1 0 ··· 0 0 1 1 ··· 0 ... ... ... ... 0 0 0 ··· 1 ; note that U2 n is an upper triangular matrix with zeros and ones chequered. In what follows, we often write matrices that consist of other matrices as blocks; e.g., ( Un Un ) is an n × 2n matrix consisting of two upper triangular blocks. 1 C3/4(Un) = n − 1. 2 C3/4(U2 n ) = n − 2. 3 C3/4(U−1 n ) = n − 1. 4 C3/4(( Un Un )) = 2n − 1. 5 3n − 6 ≤ C3/4(( U2 n Un )) ≤ C(( U2 n Un )) ≤ 3n − 3. 6 3n − 4 ≤ C3/4(( Un U−1 n )) ≤ C(( Un U−1 n )) ≤ 3n − 2. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 19. New Feebly Secure Construction We assume that lengths of public information pi, trapdoor information ti, message m, and the cipher c are the same and equal n. We let ti = Un · pi, c = ( U−1 n Un ) · m pi . An adversary would have to compute the matrix ( Un Un ) · ( c ti ) = ( Un U2 n ) · c pi . Problem Inversion without the trapdoor is harder than inversion with trapdoor, but encryption is about the same complexity as inversion without trapdoor. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 20. Solving the Problem To solve this problem we will use a feebly one-way linear function A (one of Hiltgen’s hard function with order of security up to 2). Their complexity follows from Algorithm 1, so we can stack them up into a block matrix. New protocol: Keyn = Un 0 0 In · ( s s ) = ti pi , Evaln = U−1 n Un 0 0 0 A · m1 pi m2 = ( c1 c2 ) , Invn = Un Un 0 0 0 A−1 · c1 ti c2 = ( m1 m2 ) . Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 21. Final Results Complexities of new protocol: C3/4(Keyn) = n − 1, C3/4(Evaln) = 3n + λn + o(n), C3/4(Invn) = 2n + (2 − )λn + o(n), C3/4(Advn) = 3n + (2 − )λn + o(n). The order of security of this construction is now: lim n→∞ min C3/4(Advn) C(Evaln) , C3/4(Advn) C(Invn) , C3/4(Advn) C(Keyn) = = min 3 + (2 − )λ 3 + λ , 3 + (2 − )λ 2 + (2 − )λ . This expression reaches maximum for λ = 1 1− , and this maximum is 5−4 4− , which tends to 5 4 as → 0. Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions
  • 22. Thank you! Thank you for your attention! Alex Davydow, Sergey I. Nikolenko Gate Elimination for Linear Functions