TY - GEN
T1 - Arithmetic cryptography [extended abstract]
AU - Applebaum, Benny
AU - Avron, Jonathan
AU - Brzuska, Christina
PY - 2015/1/11
Y1 - 2015/1/11
N2 - We study the possibility of computing cryptographic primitives in a fully-black-box arithmetic model over a finite field F. In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits which make only a black-box use of the underlying field, and the adversary has a full (non-black-box) access to the field. This model captures many standard informationtheoretic constructions. We prove several positive and negative results in this model for various cryptographic tasks. On the positive side, we show that, under reasonable assumptions, computational primitives like commitment schemes, public-key encryption, oblivious transfer, and general secure two-party computation can be implemented in this model. On the negative side, we prove that garbled circuits, homomorphic encryption, and secure computation with low online complexity cannot be achieved in this model. Our results reveal a qualitative diffierence between the standard model and the arithmetic model, and explain, in retrospect, some of the limitations of previous constructions.
AB - We study the possibility of computing cryptographic primitives in a fully-black-box arithmetic model over a finite field F. In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits which make only a black-box use of the underlying field, and the adversary has a full (non-black-box) access to the field. This model captures many standard informationtheoretic constructions. We prove several positive and negative results in this model for various cryptographic tasks. On the positive side, we show that, under reasonable assumptions, computational primitives like commitment schemes, public-key encryption, oblivious transfer, and general secure two-party computation can be implemented in this model. On the negative side, we prove that garbled circuits, homomorphic encryption, and secure computation with low online complexity cannot be achieved in this model. Our results reveal a qualitative diffierence between the standard model and the arithmetic model, and explain, in retrospect, some of the limitations of previous constructions.
KW - Arithmetic circuits
KW - Computational complexity
KW - Cryptography
UR - http://www.scopus.com/inward/record.url?scp=84961348708&partnerID=8YFLogxK
U2 - 10.1145/2688073.2688114
DO - 10.1145/2688073.2688114
M3 - منشور من مؤتمر
T3 - ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science
SP - 143
EP - 151
BT - ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science
T2 - 6th Conference on Innovations in Theoretical Computer Science, ITCS 2015
Y2 - 11 January 2015 through 13 January 2015
ER -