On Basing One-way Permutations on NP-hard Problems under Quantum Reductions

A fundamental pursuit in complexity theory concerns reducing worst-case problems to average-case problems. There exist complexity classes such as PSPACE that admit worst-case to average-case reductions. However, for many other classes such as NP, the evidence so far is typically negative, in the sense that the existence of such reductions would cause collapses of the polynomial hierarchy(PH). Basing cryptographic primitives, e.g., the average-case hardness of inverting one-way permutations, on NP-completeness is a particularly intriguing instance. As there is evidence showing that classical reductions from NP-hard problems to breaking these primitives result in PH collapses, it seems unlikely to base cryptographic primitives on NP-hard problems. Nevertheless, these results do not rule out the possibilities of the existence of quantum reductions. In this work, we initiate a study of the quantum analogues of these questions. Aside from formalizing basic notions of quantum reductions and demonstrating powers of quantum reductions by examples of separations, our main result shows that if NP-complete problems reduce to inverting one-way permutations using certain types of quantum reductions, then coNP $\subseteq$ QIP(2).

[1]  Miklós Ajtai,et al.  Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.

[2]  Joan Feigenbaum,et al.  On the random-self-reducibility of complete sets , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[3]  Gilles Brassard,et al.  Relativized cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).

[4]  Bill Rosgen Computational distinguishability of degradable and antidegradable channels , 2010, Quantum Inf. Comput..

[5]  Dave Bacon,et al.  Optimal measurements for the dihedral hidden subgroup problem , 2005, Chic. J. Theor. Comput. Sci..

[6]  Daniele Micciancio,et al.  Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[7]  Mark M. Wilde,et al.  Two-Message Quantum Interactive Proofs and the Quantum Separability Problem , 2012, 2013 IEEE Conference on Computational Complexity.

[8]  Rahul Jain,et al.  Two-Message Quantum Interactive Proofs Are in PSPACE , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[9]  Daniel R. Simon,et al.  On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[10]  William Rosgen,et al.  Computational Distinguishability of Quantum Channels , 2009, ArXiv.

[11]  Lance Fortnow,et al.  Are There Interactive Protocols for CO-NP Languages? , 1988, Inf. Process. Lett..

[12]  Sean Hallgren,et al.  Quantum algorithms for some hidden shift problems , 2003, SODA '03.

[13]  Andrej Bogdanov,et al.  On Basing Size-Verifiable One-Way Functions on NP-Hardness , 2015, TCC.

[14]  Daniele Micciancio Almost Perfect Lattices, the Covering Radius Problem, and Applications to Ajtai's Connection Factor , 2003, SIAM J. Comput..

[15]  Luca Trevisan,et al.  On worst-case to average-case reductions for NP problems , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[16]  Rahul Jain,et al.  QIP = PSPACE , 2011, JACM.

[17]  Cynthia Dwork,et al.  A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.

[18]  Oded Regev,et al.  Quantum computation and lattice problems , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[19]  Joan Feigenbaum,et al.  Lower bounds on random-self-reducibility , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[20]  Oded Goldreich,et al.  On basing one-way functions on NP-hardness , 2006, STOC '06.

[21]  Richard Cleve,et al.  A Quantum Goldreich-Levin Theorem with Cryptographic Applications , 2002, STACS.

[22]  Andrej Bogdanov,et al.  Limits of Provable Security for Homomorphic Encryption , 2013, CRYPTO.

[23]  Gilles Brassard,et al.  Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..

[24]  François Le Gall,et al.  Generalized Quantum Arthur-Merlin Games , 2013, CCC.

[25]  Schumacher,et al.  Sending entanglement through noisy quantum channels. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[26]  Oded Regev,et al.  New lattice based cryptographic constructions , 2003, STOC '03.

[27]  Tomoyuki Yamakami,et al.  Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding , 2006, SIAM J. Comput..

[28]  Shafi Goldwasser,et al.  Private coins versus public coins in interactive proof systems , 1986, STOC '86.

[29]  Vinod Vaikuntanathan,et al.  On Basing Private Information Retrieval on NP-Hardness , 2016, TCC.

[30]  Alexei Y. Kitaev,et al.  Parallelization, amplification, and exponential time simulation of quantum interactive proof systems , 2000, STOC '00.

[31]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.

[32]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.