Limits on the provable consequences of one-way permutations

  • Authors:
  • R. Impagliazzo;S. Rudich

  • Affiliations:
  • Computer Science Division, University of California at Berkeley, Berkeley, California;Computer Science Department, University of Toronto, Toronto, Canada M5S 1A4

  • Venue:
  • STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
  • Year:
  • 1989

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present strong evidence that the implication, “if one-way permutations exist, then secure secret key agreement is possible”, is not provable by standard techniques. Since both sides of this implication are widely believed true in real life, to show that the implication is false requires a new model. We consider a world where all parties have access to a black box for a randomly selected permutation. Being totally random, this permutation will be strongly one-way in a provable, information-theoretic way. We show that, if P = N P, no protocol for secret key agreement is secure in such a setting. Thus, to prove that a secret key agreement protocol which uses a one-way permutation as a black box is secure is as hard as proving P ≠ N P. We also obtain, as a corollary, that there is an oracle relative to which the implication is false, i.e., there is a one-way permutation, yet secret-exchange is impossible. Thus, no technique which relativizes can prove that secret exchange can be based on any one-way permutation. Our results present a general framework for proving statements of the form, “Cryptographic application X is not likely possible based solely on complexity assumption Y.”