DocumentCode :
2914417
Title :
On the Compressibility of NP Instances and Cryptographic Applications
Author :
Harnik, Danny ; Naor, Moni
Author_Institution :
Dept. of Comput. Sci., Technion, Haifa
fYear :
2006
fDate :
Oct. 2006
Firstpage :
719
Lastpage :
728
Abstract :
We initiate the study of compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problems. We consider NP problems that have long instances but relatively short witnesses. The question is, can one efficiently compress an instance and store a shorter representation that maintains the information of whether the original input is in the language or not. We want the length of the compressed instance to be polynomial in the length of the witness rather than the length of original input. Such compression enables to succinctly store instances until a future setting will allow solving them, either via a technological or algorithmic breakthrough or simply until enough time has elapsed. We give a new classification of NP with respect to compression. This classification forms a stratification of NP that we call the VC hierarchy. The hierarchy is based on a new type of reduction called W-reduction and there are compression-complete problems for each class. Our motivation for studying this issue stems from the vast cryptographic implications compressibility has. For example, we say that SAT is compressible if there exists a polynomial p(middot, middot) so that given a formula consisting of m clauses over n variables it is possible to come up with an equivalent (w.r.t satisfiability) formula of size at most p(n, log m). Then given a compression algorithm for SAT we provide a construction of collision resistant hash functions from any one-way function. This task was shown to be impossible via black-box reductions (D. Simon, 1998), and indeed the construction presented is inherently non-black-box. Another application of SAT compressibility is a cryptanalytic result concerning the limitation of everlasting security in the bounded storage model when mixed with (time) complexity based cryptography. In addition, we study an approach to constructing an oblivious transfer protocol f- rom any one-way function. This approach is based on compression for SAT that also has a property that we call witness retrievability. However, we mange to prove severe limitations on the ability to achieve witness retrievable compression of SAT
Keywords :
computability; computational complexity; cryptography; data compression; decision theory; pattern classification; NP classification; NP decision problems; SAT; compression-complete problem; cryptography; hash function; non-black-box reductions; time complexity; transfer protocol; Application software; Approximation algorithms; Compression algorithms; Computer science; Cryptographic protocols; Cryptography; Polynomials; Secure storage; Security; Virtual colonoscopy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 2006. FOCS '06. 47th Annual IEEE Symposium on
Conference_Location :
Berkeley, CA
ISSN :
0272-5428
Print_ISBN :
0-7695-2720-5
Type :
conf
DOI :
10.1109/FOCS.2006.54
Filename :
4031406
Link To Document :
بازگشت