We construct non-interactive non-malleable commitments without setup in the plain model, under well-studied assumptions. First, we construct non-interactive non-malleable commitments w.r.t. commitment for (Formula Presented) tags for a small constant (Formula Presented), under the following assumptions: 1.Sub-exponential hardness of factoring or discrete log.2.Quantum sub-exponential hardness of learning with errors (LWE). Second, as our key technical contribution, we introduce a new tag amplification technique. We show how to convert any non-interactive non-malleable commitment w.r.t. commitment for (Formula Presented) tags (for any constant (Formula Presented)) into a non-interactive non-malleable commitment w.r.t. replacement for (Formula Presented) tags. This part only assumes the existence of sub-exponentially secure non-interactive witness indistinguishable (NIWI) proofs, which can be based on sub-exponential security of the decisional linear assumption. Interestingly, for the tag amplification technique, we crucially rely on the leakage lemma due to Gentry and Wichs (STOC 2011). For the construction of non-malleable commitments for (Formula Presented) tags, we rely on quantum supremacy. This use of quantum supremacy in classical cryptography is novel, and we believe it will have future applications. We provide one such application to two-message witness indistinguishable (WI) arguments from (quantum) polynomial hardness assumptions.
CITATION STYLE
Kalai, Y. T., & Khurana, D. (2019). Non-interactive Non-malleability from Quantum Supremacy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11694 LNCS, pp. 552–582). Springer Verlag. https://doi.org/10.1007/978-3-030-26954-8_18
Mendeley helps you to discover research relevant for your work.