On the Existence of Extractable One-Way Functions

نویسنده

  • Karim Baghery
چکیده

Extractability is one of the main and central tools for design and analysis of modern cryptographic protocols. We say a function is extractable if any adversary that outputs a point in the range of the function is guaranteed to ”know” a corresponding preimage. This research presents a short report on the existence of extractable one-way functions based on a recent paper by Bitansky et al. [BCPR16]. We discuss with details on two main results of the paper which: 1) shows that if there exist indistinguishability obfuscators for a certain class of circuits, then there do not exist (generalized) extractable one-way functions, with respect to common auxiliary-input of unbounded polynomial length. 2) presents a contraction of bounded-auxiliary-input extractable one-way functions and bounded-auxiliary-input generalized extractable one-way functions based on relatively standard assumptions (e.g., sub-exponential hardness of Learning with Errors). Finally, we conclude the report.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Theory of Extractable Functions

Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to “know” a corresponding preimage. Here, knowledge is captured by the existence of an efficient extractor that recovers the preimage from the internal state of the adversary. Extractability of functions was defined by the authors (ICALP’08) in the context of perfectly one-way...

متن کامل

How To Construct Extractable One-Way Functions Against Uniform Adversaries

A function f is extractable if it is possible to algorithmically “extract,” from any program that outputs a value y in the image of f, a preimage of y. When combined with hardness properties such as one-wayness or collision-resistance, extractability has proven to be a powerful tool. However, so far, extractability has not been explicitly shown. Instead, it has only been considered as a nonstan...

متن کامل

Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall

We show that if there exist indistinguishability obfuscators for all circuits then there do not exist auxiliary-input extractable one-way functions. In particular, the knowledge of exponent assumption with respect to adversaries with auxiliary input is false in any group where computing discrete logarithms is intractable. The proof uses the “punctured programs” technique of [Sahai-Waters 2013].

متن کامل

On the existence of fixed points for contraction mappings‎ ‎depending on two functions

‎In this paper we study the existence of fixed points for mappings defined on complete metric spaces‎, ‎satisfying a general contractive inequality depending on two additional mappings‎.

متن کامل

Extractable Perfectly One-Way Functions

We propose a new cryptographic primitive, called extractable perfectly one-way (EPOW) functions. Like perfectly one-way (POW) functions, EPOW functions are probabilistic functions that reveal no information about their input, other than the ability to verify guesses. In addition, an EPOW function, f , guarantees that any party that manages to compute a value in the range of f “knows” a correspo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017