On Search Complexity of Discrete Logarithm

07/06/2021
by   Pavel Hubáček, et al.
0

In this work, we study the discrete logarithm problem in the context of TFNP - the complexity class of search problems with a syntactically guaranteed existence of a solution for all instances. Our main results establish that suitable variants of the discrete logarithm problem are complete for the complexity class PPP, respectively PWPP, i.e., the subclasses of TFNP capturing total search problems with a solution guaranteed by the pigeonhole principle, respectively the weak pigeonhole principle. Besides answering an open problem from the recent work of Sotiraki, Zampetakis, and Zirdelis (FOCS'18), our completeness results for PPP and PWPP have implications for the recent line of work proving conditional lower bounds for problems in TFNP under cryptographic assumptions. In particular, they highlight that any attempt at basing average-case hardness in subclasses of TFNP (other than PWPP and PPP) on the average-case hardness of the discrete logarithm problem must exploit its structural properties beyond what is necessary for constructions of collision-resistant hash functions. Additionally, our reductions provide new structural insights into the class PWPP by establishing two new PWPP-complete problems. First, the problem DOVE, a relaxation of the PPP-complete problem PIGEON. DOVE is the first PWPP-complete problem not defined in terms of an explicitly shrinking function. Second, the problem CLAW, a total search problem capturing the computational complexity of breaking claw-free permutations. In the context of TFNP, the PWPP-completeness of CLAW matches the known intrinsic relationship between collision-resistant hash functions and claw-free permutations established in the cryptographic literature.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/20/2018

PPP-Completeness with Connections to Cryptography

Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP w...
research
09/15/2022

Extremal combinatorics, iterated pigeonhole arguments, and generalizations of PPP

We study the complexity of computational problems arising from existence...
research
09/08/2020

Completeness in Polylogarithmic Time and Space

Complexity theory can be viewed as the study of the relationship between...
research
03/27/2020

Non-linearity of the Carlet-Feng function, and repartition of Gauss sums

The search for Boolean functions that can withstand the main crypyograph...
research
05/31/2018

The Complexity of Splitting Necklaces and Bisecting Ham Sandwiches

We resolve the computational complexity of two problems known as NECKLAC...
research
06/14/2018

Ramanujan graphs in cryptography

In this paper we study the security of a proposal for Post-Quantum Crypt...
research
12/08/2019

The Classes PPA-k: Existence from Arguments Modulo k

The complexity classes PPA-k, k ≥ 2, have recently emerged as the main c...

Please sign up or login with your details

Forgot password? Click here to reset