Computational two-party correlation: a dichotomy for key-agreement protocols

From MaRDI portal
Publication:5138779

DOI10.1137/19M1236837zbMATH Open1498.94064arXiv2105.00765MaRDI QIDQ5138779FDOQ5138779


Authors: Iftach Haitner, Kobbi Nissim, Eran Omri, Ronen Shaltiel, Jad Silbak Edit this on Wikidata


Publication date: 4 December 2020

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Abstract: Let pi be an efficient two-party protocol that given security parameter kappa, both parties output single bits Xkappa and Ykappa, respectively. We are interested in how (Xkappa,Ykappa) "appears" to an efficient adversary that only views the transcript Tkappa. We make the following contributions: We develop new tools to argue about this loose notion and show (modulo some caveats) that for every such protocol pi, there exists an efficient simulator such that the following holds: on input Tkappa, the simulator outputs a pair (X'kappa,Y'kappa) such that (X'kappa,Y'kappa,Tkappa) is (somewhat) computationally indistinguishable from (Xkappa,Ykappa,Tkappa). We use these tools to prove the following dichotomy theorem: every such protocol pi is: - either uncorrelated -- it is (somewhat) indistinguishable from an efficient protocol whose parties interact to produce Tkappa, but then choose their outputs independently from some product distribution (that is determined in poly-time from Tkappa), - or, the protocol implies a key-agreement protocol (for infinitely many kappa's). Uncorrelated protocols are uninteresting from a cryptographic viewpoint, as the correlation between outputs is (computationally) trivial. Our dichotomy shows that every protocol is either completely uninteresting or implies key-agreement. We use the above dichotomy to make progress on open problems on minimal cryptographic assumptions required for differentially private mechanisms for the XOR function. A subsequent work of Haitner et al. uses the above dichotomy to makes progress on a longstanding open question regarding the complexity of fair two-party coin-flipping protocols.


Full work available at URL: https://arxiv.org/abs/2105.00765




Recommendations




Cites Work


Cited In (9)





This page was built for publication: Computational two-party correlation: a dichotomy for key-agreement protocols

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5138779)