Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols

2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS)(2018)

引用 12|浏览99
暂无评分
摘要
Let π be an efficient two-party protocol that given security parameter k, both parties output single bits X k and Y k , respectively. We are interested in how (X k , Y k ) "appears" to an efficient adversary that only views the transcript T k . We make the following contributions: · We develop new tools to argue about this loose notion, and show (modulo some caveats) that for every such protocol π, there exists an efficient simulator such that the following holds: on input T k , the simulator outputs a pair (X' k , Y' k ) such that (X' k , Y' k , T k ) is (somewhat) computationally indistinguishable from (X k , Y k , T k ). · We use these tools to prove the following dichotomy theorem: every such protocol π is: - either uncorrelated - it is (somewhat) indistinguishable from an efficient protocol whose parties interact to produce T k , but then choose their outputs independently from some product distribution (that is determined in poly-time from T k ), - or, the protocol implies a key-agreement protocol (for infinitely many k's). Uncorrelated protocols are uninteresting from a cryptographic viewpoint, as the correlation between outputs is (computationally) trivial. Our dichotomy shows that every protocol is either completely uninteresting or implies key-agreement. ·We use the above dichotomy to make progress on open problems on minimal cryptographic assumptions required for differentially private mechanisms for the XOR function. · A subsequent work of Haitner et al. uses the above dichotomy to makes progress on a long-standing open question regarding the complexity of fair two-party coin-flipping protocols. We highlight the following ideas regarding our technique: · The simulator algorithm is obtained by a carefully designed "competition" between efficient algorithms attempting to forecast ((X k , Y k )|T k = t). The winner is used to simulate the outputs of the protocol. · Our key-agreement protocol uses the simulation to reduce to an information theoretic setup, and is in some sense non-black box.
更多
查看译文
关键词
Key Agreement,Simulator,Differential Privacy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要