PPT

Coin Flipping of any Constant Bias
Implies One-Way Functions
Iftach Haitner
Based on joint works with
Itay Berman, Eran Omri and Aris Tentes
Cryptography Implies One-Way Functions
Almost all “computational” cryptography is known to
imply one-way functions [c.f. Impagliazzo-Luby ‘89]
 One-way functions (OWFs): efficiently computable functions that no
efficient algorithm can invert (with more than negligible probability)
 These reductions are typically rather straightforward for
non-interactive primitives, or for interactive primitives
with single “failure point”, e.g., commitment schemes
 Rather complex for some interactive primitives
Full characterization of coin-flipping protocols is not known
Coin-Flipping Protocols
Parities want to jointly flip a uniform string
I want 𝒄 = 0
𝒄 ← {0,1}
𝒄
Output 𝒄
3
Output 𝒄
Blum’s Coin-Flipping Protocol
I want 𝒄 = 0
𝒛 ← 𝑐𝑜𝑚𝑚𝑖𝑡(𝒂)
𝒃 ← {0,1}
𝒂 ← {0,1}
𝒃
𝒂 ← 𝑑𝑒𝑐𝑜𝑚𝑚𝑖𝑡(𝒛)
Output
𝒄=𝒂
𝒄=𝒂 ⊕ 𝒃
⊕𝒃
• Negligible bias
4
Output
• Commitment obtained using OWF
Coin-Flipping Protocols
Efficient 2-party protocol (A,B) is 𝛿 -bias CF:
1. Pr A,B 1𝑛 = ‘1’ = Pr A,B 1𝑛 = ‘0’ = 1 2
2. For any PPT A and 𝑐 ∈ 0,1 ,
Pr A,B 1𝑛 = 𝑐 ≤ 1 2 + 𝛿 𝑛
(Same for B)
 Fairness is not required
5
Weak Coin-Flipping Protocols
Efficient 2-party protocol (A,B) is 𝛿 -bias CF:
1. Pr A,B 1𝑛 = ‘1’ = Pr A,B 1𝑛 = ‘0’ = 1 2
2. For any PPT’s A and B,
Pr A,B 1𝑛 = ‘1’ , Pr A,B 1𝑛 = ‘0’ ≤ 1 2 + 𝛿 𝑛
Strong CF )Weak CF
 Numerous applications (ZK proofs, SFE,…)
 Implied (with negligible bias) by OWFs
[Blum’83, Naor‘89, Håstad et. al ‘90]
Does (weak) coin flipping imply OWFs?
Known Results
1
 –bias
𝑚
CF implies OWFs [IL ‘89], where 𝑚 is the protocol round
complexity
 Constant-round, non-trivial (i.e.,
1
1
–
2 poly(n)
–bias) CF implies
OWFs [Maji, Prabhakaran, Sahai ‘10]
2−1
2
−𝑜(1) -bias strong CF implies OWFs [Haitner, Omri ‘11]

 Constant-round, non-trivial CF implies NP ⊈ BPP [Zachos ‘86]

1
4
− 𝑜(1) –bias CF implies NP ⊈ BPP [Maji, Prabhakaran, Sahai ‘10]
 Non-trivial CF implies PSPACE ⊈ BPP
For 𝜔(1)-round, 𝜔
1
𝑚
–bias CF, results are far from being tight
[Haitner-Omri ‘11]
Theorem 1 [Haitner-Omri ‘11]
Coin flipping with bias
2−1
– o(1)
2
2−1
≈ 0.207
2
implies OWFs
 Only holds for strong coin tossing
Main lemma: Assume @OWFs and let (A,B) be CF protocol.
Then exist efficient strategies A and B s.t.:
Pr[(A,B)(1n)= ‘1’]
>
Pr[(A,B)(1n)= ‘1’] >
2
2
2
2
− 𝑜(1), or
−o 1 .
 Optimal two-sided attacker
 Matches the Quantum bound
8
(Same holds for ‘0’)
[Berman-Haitner-Tentes ‘13]
Theorem 2 [Berman-Haitner-Tentes ‘13]
Coin flipping of any (non-trivial) constant bias
(e.g., 0.4999) implies OWFs
Also holds for weak coin tossing
Main lemma: Assume @OWFs and let (A,B) be CF protocol.
Then ∀𝜖 > 0 exist efficient strategies A and B s.t.:
Pr[(A,B)(1n)= ‘1’] >1 − 𝜖, or
Pr[(A,B)(1n)= ‘0’] >1 − 𝜖. (Same holds for opposite directions)
 Almost fully characterizes complexity of coin-flipping protocols.
Yet to be characterized: CF of bias
1
2
− 𝑜(1)
Rest of the Talk
 About proving the necessity of OWFs
 The optimal attack on CF protocols
 The biased-continuation attack
 Approximating the biased-continuation attack
(assuming ∄OWFs)
Proving The Necessity of OWFs
Given a cryptographic primitive P (e.g., commitment scheme)
P’s core function: efficiently computable function whose
inversion implies breaking the security of P
P has a core function ) OWF are necessary for P
Example 1: Symmetric key encryption (G,E,D)
𝑓 𝑘, 𝑟1 , … , 𝑟𝑡 , 𝑚1 , … 𝑚𝑡 = E 𝑘, 𝑟1 , 𝑚1 , … , E 𝑘, 𝑟𝑡 , 𝑚𝑡
Example 2: For commitment schemes, the core function maps the
parties’ coins to the commitment string
Hard to find for interactive primitives (with no single failing point)
 Does there exist such core function?
 Distribution induced by attack might be different from uniform
The Optimal Adversaries
12
Protocols as Binary Trees
 Nodes − transcripts
 Messages are bits
 Inner nodes labeling: who controls the node
 Leaves labeling: protocol’s outcome
 Edges labeling: probability of taking the edge
 1−leaves/0−leaves
 Node value: probability of hitting a 1−leaf, once in the node
Optimal Attacks on CF Protocols
Optimal adversaries for 𝜋 = (A,B):
A1 – optimal valid strategy for A attacking towards 1
B – optimal valid strategy for B attacking towards 0
0
ℓ𝑜
Pr [‘1’] = 1
1
(A1 ,B0 )
) OPTB0 ≝ Pr ‘0’ = 1 − 𝛼 < 1
(A,B0 )
Question: what makes A1 wins?
Fact: ℓ09is𝐁-immune
𝐁-immune:
Lemma:
measure M1 over 1-leaves of 𝜋 (i.e.,
0
Pr↦ ℓ[0,1]):
=
Pr
ℓ
=
1
−
OPT
M1 :1-leaves
0
0
B
0
A
®
1-®
Assume wlg. that
A,B
14
Ex M
(A,B)
1
A,B
= Ex0 M1 = 1 − OPTB0
(A,B )
B
¯
A
0
1
The Biased Continuation Attack
Or, hitting the B–immune measure
15
The Biased-Continuation Attack
The (first) biased-continuation attack A 1 for A towards 1
On transcript 𝑢, A 1 samples uniform (𝑟A , 𝑟B ):
1.
A(𝑟A ),B(𝑟B ) is consistent with u
2.
out A 𝑟A , B 𝑟B
= ‘1’
Sends A 𝑟A ’s reply on 𝑢
A
½
(1)
B
A
A
…
is analogous for B towards 0.
B
∄OWFs is necessary, but not sufficient
¼
¾
Amazingly useful!
A
A
Also used for Parallel Repetition thms
B
B
[Håstad et. al ‘10], [Haitner‘09]
B
½
0
0
1
…
B
1
0
…
Recursions
(A
A
2
1
, B) is also a protocol.
= A 1 on (A 1 , B).
On transcript 𝑢, A 2 samples uniform (𝑟A(1), 𝑟B):
1.
A(1) (𝑟A ),B(𝑟B ) is consistent with 𝑢
(1)
2.
out A(1) 𝑟A(1) , B 𝑟B
Sends A(1)
𝑟A(1)
= ‘1’
½
¾
’s reply on 𝑢.
¼
𝑚
is not efficient.
Question: How well A
𝑂(1)
does?
¾
AA1
0
AA1
B
B
0
1
B
AA1
AA1
…
Problem: A
¼
½
B
Fact: For 𝑚-round protocol,
A 𝑚 converges to A‘s optimal attacker.
17
AA1
…
B
1
0
(𝑖)
A
and the B–Immune Measure
𝑣𝑎𝑙 A(1) , B ≥ Pr
(A
1
,B)
ℓ𝑜 = 2𝛼
where 𝑣𝑎𝑙(𝜋) ≝ Pr ‘1’
𝜋
(𝑘)
𝑣𝑎𝑙 A , B ≥ Pr ℓ𝑜 =
(A
𝑘
Since 𝑣𝑎𝑙 A, B =
𝑘−1 𝑣𝑎𝑙
𝑖=0
,B)
®
A 𝑖 ,B
1
1
log / log
𝛼
1−𝜖
Key observation: if OPT0B = 1 − 𝛼 then
∀𝑘 > 0: 𝑣𝑎𝑙
≥
Ex
(A
𝑘
,B)
M
1
1-®
B
1
) 𝑣𝑎𝑙 A(𝑘) , B ≥ 1 − 𝜖
A(𝑘) , B
A
≥
¯
A
0
1
…
for 𝑘 =
ℓ𝑜
𝛼
letting A(0) = A.
1
2
𝛼
𝑣𝑎𝑙 A, B
𝛼
𝑘−1
𝑖 ,B
𝑣𝑎𝑙
A
𝑖=0
Problem:
𝛼 ∈ 𝑜(1) ) (even for constant 𝜖 > 0) 𝑘 ∈ 𝜔 1 ) A(𝑘) is inefficient
Conditional Protocols
OPTB0 (𝜋) = 1 − 𝛼 ) 9 M𝜋1 over 1-leaves of 𝜋 with Ex M𝜋1 =𝛼
𝜋
and Ex M𝜋1 = 𝑘−1 ® 𝑖
(A 𝑘 ,B)
𝑖=0
𝑣𝑎𝑙 A
,B
′
′
The conditional protocol π = A , B
′
=
π|¬M𝜋1
A
®
B
1
¯
) no B–immune measure ) B0 wins.
OPTA1 (𝜋 ′ ) ≝
1-®
A
0
Pr
‘1’ = 1 − 𝛽 < 1
′1
(A ,B)
𝜋
and
Ex
𝑘
(A′ ,B′
Ex
(A,B
𝑘
)
)
M𝜋0 ′ =
M𝜋0 ′
=
𝛽
𝑘−1
𝑖=0
(1− 𝑣𝑎𝑙(A′,B′ 𝑖 ))
1−𝛼 ⋅𝛽
𝑘−1(1− 𝑣𝑎𝑙(A′ ,B′ 𝑖
𝑖=0
Still, 𝛽 might be small…
1−𝛼 𝑘 ⋅ Ex
≥
))
(A ,B )
𝑘−1
𝑖=0 (1
M𝜋0 ′
− 𝑣𝑎𝑙 A, B 𝑖 )
…
1
) 9 measure M𝜋0 ′ over 0-leaves of 𝜋′ with Ex′ M𝜋0 ′ =𝛽
Conditional Protocols cont.
The conditional protocol π′′ = A′′ , B′′ = π′|¬M𝜋0 ′
OPTB0 (𝜋′′)
≝
Pr
‘0’ = 1 − 𝛼 ′ < 1
(A′′,B′′ )
A
®
1-®
0
0
) 9 measure M𝜋1 ′′ over 1-leaves of π′′ with Ex
M
𝜋′′ =𝛼′
′′
B
1
¯
𝜋
and
Ex
𝑘
(A′′
(A 𝑘 ,B)
M𝜋1 ′′ ≥
𝛼′
=
𝑘−1
𝑖=0 𝑣𝑎𝑙
1−𝛽 𝑘 ⋅ Ex
(A ,B)
𝑘−1 𝑣𝑎𝑙
𝑖=0
𝑖
A′′
M𝜋1 ′′
,B′′
1 − 𝛼 ⋅ 1 − 𝛽 ⋅ 𝛼′
A
0
𝛼′
1
A 𝑖 ,B
1
Can we gain also from M𝜋
?
For the measure M21 (ℓ) = M𝜋1 (ℓ) + 1 − M𝜋1 (ℓ) ⋅ M𝜋1 ′′ (ℓ)
Ex
(A
𝑘
,B)
M21
≥
1−𝛽 𝑘 ⋅ Ex M21
𝜋
𝑘−1 𝑣𝑎𝑙
𝑖=0
A 𝑖 ,B
𝛼 + 1 − 𝛼 ⋅ 1 − 𝛽 ⋅ 𝛼′
…
Ex
,B′′ )
M𝜋1 ′′
Sequence of Conditional Protocols
There exists measure sequences
M11 , M21 , M31 … ,over 1-leaves
M10 , M20 , M30 … , over 0-leaves, s.t.:
𝜇𝑡0 ≝ Ex Mt0
= 𝜇𝑡1 = ½ for large enough t
π


Ex
k
(A
,B)
Ex
(A,B
k
)
M𝑧1
M𝑧0
≥
≥
1−𝜇𝑧0
𝑘−1
𝑖=0 𝑣𝑎𝑙
𝑘
⋅ 𝜇𝑧1
A i ,B
1−𝜇𝑧1
𝑘
𝑘−1(1− 𝑣𝑎𝑙
𝑖=0
and
⋅ 𝜇𝑧0
A,B i )
For 𝜖 > 0 assume wlg. that 9z > 0 s.t. 𝜇𝑧1 ≥ 𝜖/2and 𝜇𝑧0 < 𝜖/2
)
Ex
(A
k
,B)
M𝑧1 ≥
𝜖 𝑘 𝜖
⋅2
𝑘−1 𝑣𝑎𝑙 A i
𝑖=0
1−2
,B
>1−𝜖
for 𝑘 =
2
log 𝜖
1−𝜖/2
log
1−𝜖
An Efficient Attack On CF Protocols
(assuming ∄OWFs)
22
Transcript Function
Leaf induced by (𝑟A , 𝑟B )
For 𝜋 = (A,B) let 𝑓𝜋 𝑟A , 𝑟B , 𝑖 ≝ ℓ 𝑟A , 𝑟B
1,…,𝑖
A 1 needs to invert 𝑓𝜋
Seems that A 𝑘 needs to invert 𝑓𝜋 , 𝑓𝜋1 , … , 𝑓𝜋𝑘−1 ,
for 𝜋 𝑗 = A 𝑗 ,B
Might be impossible even if ∄OWFs
Since A
23
𝑘
is stateless, suffices to invert 𝑓𝜋
Hard to Invert Transcripts
 𝐿𝑜𝑤𝑉𝑎𝑙𝛿A = {𝑣 ∶ 𝑣 in A′ s control & 𝑣𝑎𝑙 𝑣 < 𝛿}

Un𝐵𝑎𝑙𝛾A = {𝑣 ∶ 𝑣 in A′ s control & Pr
𝑘
(A
,B)
𝑣 >𝛾⋅ Pr 𝑣 }
(A,B)
@OWF does not suffice for attacking these nodes
…
A
2−𝑛
0
A
½
1
24
0
…
Large is Balanced
A
 𝐿𝑜𝑤𝑉𝑎𝑙𝛿A = 𝑣: 𝑣 in A′ s control & 𝑣𝑎𝑙 𝑣 < 𝛿
 Un𝐵𝑎𝑙𝛾A = {𝑣: 𝑣 in A′ s control & Pr 𝑣 > 𝛾 ⋅ Pr 𝑣 }
𝑘
(A
(A,B)
,B)
Pr
ℓ←(A
𝑘
,B)
[ℓ ∈ 𝑑𝑒𝑠𝑐
A
&ℓ∉
0
½
1
Lemma: ∀δ > 0 ∃c >0 ∶
Un𝐵𝑎𝑙𝛾A
2−𝑛
0
1
A
𝑑𝑒𝑠𝑐(𝐿𝑜𝑤𝑉𝑎𝑙𝛿 )]≤ 𝑐
𝛾
where 𝑑𝑒𝑠𝑐 𝑆 ≝ descendants of 𝑆
 We can focus on low-value nodes
Corollary: Assume all low-value nodes are in B’s control and ∄OWFs
) exists an efficient approximation A(𝑘) of A 𝑘
𝑣𝑎𝑙 A(𝑘) , B > 1 − 𝜖 ) 𝑣𝑎𝑙 A(𝑘) , B > 1 − 2𝜖
𝑣𝑎𝑙 A, B = 0.5
Pruned Protocols
A
B
A
B
0
0
1
…
The pruned variant 𝜋𝛿 = (A𝛿, B𝛿) of 𝜋 = (A,B)
A
.5
 B𝛿 controls all low-value nodes
BA
B
.999
.2
𝐿𝑜𝑤𝛿 = {𝑣 ∶ 𝑣𝑎𝑙 𝑣 < 𝛿}
 A𝛿 controls all high-value nodes
A
A .3 A
A
.001 B
𝐻𝑖𝑔ℎ𝛿 = {𝑣 ∶ 𝑣𝑎𝑙 𝑣 > 1 − 𝛿}
1
…
By previous lemmas, ∀𝜖 > 0 ∃𝑘 > 0 :
either 𝑣𝑎𝑙 A𝛿𝑘 , B𝛿 > 1 − 𝜖 or 𝑣𝑎𝑙 A𝛿 , B𝛿(𝑘)
26
<𝜖
B
0
1
0
The Pruning Attacker
The pruning attacker, acts as if it is in the pruned protocol
Let 𝜋 = (A,B).
The pruning attacker A
k ,𝛿
for A, acts as A(k)
𝛿
until reaching a pruned node, and then start acting honestly (like A)
Assume wlg. that 𝑣𝑎𝑙 A(k)
, B > 1 − 𝜖 then
𝛿
𝑣𝑎𝑙 A
k ,𝛿
,B
.5
>1−𝜖 −𝛿
.999
BA
A
A
0
27
0
A
A
BA
A
BA
1
A
.2
.3
1
A
B
.001
A
BB
B
0
1
0
Summary
 Coin flipping of any constant-bias implies OWFs
 Challenge − show the same for bias
1
2
− 𝑜(1)
 Further implications for the connection between zero-sum
games and existence of OWFs