Provable Instantiations of Correlation Intractability and the Fiat-Shamir Heuristic

Interactive proof systems, introduced in a seminal work of Goldwasser, Micali, and Rackoff, have become one of the most powerful and flexible tools in cryptography and computer science at large. They have directly led to some of the biggest breakthroughs in theoretical cryptography, complexity, and...

Full description

Bibliographic Details
Main Author: Lombardi, Alex
Other Authors: Vaikuntanathan, Vinod
Format: Thesis
Published: Massachusetts Institute of Technology 2023
Online Access:https://hdl.handle.net/1721.1/147579
Description
Summary:Interactive proof systems, introduced in a seminal work of Goldwasser, Micali, and Rackoff, have become one of the most powerful and flexible tools in cryptography and computer science at large. They have directly led to some of the biggest breakthroughs in theoretical cryptography, complexity, and quantum computation. They are also at the center of a revolution in practical cryptography, particularly in the context of blockchains and cryptocurrencies. However, despite their importance, our understanding of cryptographic proofs is surprisingly limited. The central problem studied in this thesis is the following question: Can we remove interaction from interactive proofs? Even though this question sounds almost paradoxical, Fiat and Shamir (1986) proposed (and Blum extended) a heuristic methodology for removing interaction from a huge class of interactive proofs. This methodology is ubiquitous and essential for practical applications, but for over thirty years, we had no proof of its security, even for a single non-trivial case. The main goal of this thesis is to give a solid theoretical foundation for the FiatShamir transformation by developing general-purpose tools, techniques, and abstractions for characterizing its security. We propose a two-step methodology for obtaining provable instantiations that relies on the notion of correlation intractability, which is a hash function security property requiring that it is computationally infeasible to find pre-specified input-output correlations in the hash function. Using this methodology, we obtain various new results in cryptography, touching on areas such as non-interactive zero knowledge, delegation of computation, the insecurity of parallel repetition, and the cryptographic hardness of computing Nash Equilibria in game theory.