Key-agreement protocols whose security is proven in the random oracle model are an important alternative to protocols based on public-key cryptography. In the random oracle model, the parties and the eavesdropper have access to a shared random function (an "oracle"), but the parties are limited in the number of queries they can make to the oracle. The random oracle serves as an abstraction for black-box access to a symmetric cryptographic primitive, such as a collision resistant hash. Unfortunately, as shown by Impagliazzo and Rudich [STOC '89] and Barak and Mahmoody [Crypto '09], such protocols can only guarantee limited secrecy: the key of any $\ell$-query protocol can be revealed by an $O(\ell^2)$-query adversary. This quadratic gap between the query complexity of the honest parties and the eavesdropper matches the gap obtained by the Merkle's Puzzles protocol of Merkle [CACM '78]. In this work we tackle a new aspect of key-agreement protocols in the random oracle model: their communication complexity. In Merkle's Puzzles, to obtain secrecy against an eavesdropper that makes roughly $\ell^2$ queries, the honest parties need to exchange $\Omega(\ell)$ bits. We show that for protocols with certain natural properties, ones that Merkle's Puzzle has, such high communication is unavoidable. Specifically, this is the case if the honest parties' queries are uniformly random, or alternatively if the protocol uses non-adaptive queries and has only two rounds. Our proof for the first setting uses a novel reduction from the set-disjointness problem in two-party communication complexity. For the second setting we prove the lower bound directly, using information-theoretic arguments.
翻译:以随机操作模式证明安全性的密钥协议在随机操作模式中被证明是基于公用钥匙加密协议的一个重要替代方案。 在随机操作模式中, 当事人和窃听器可以使用一个共享随机功能( oracle ), 但当事人可以向神器查询的次数有限。 随机操作作为黑箱访问一个对称加密原始文件的抽象工具, 比如一个防碰撞的散列。 不幸的是, 正如 Impagliazzo 和 Rudich [STOC '89] 以及 Barak 和 Mahmody [Crypto '09] 所显示的那样, 这些协议只能保证有限的保密性: 任何$\ell- queper 协议的密钥都可以通过一个$( ell2) 美元- quepretal commission 来披露。 诚实的当事人的询问和缩略图的解是, 我们只能通过两个协议的解析 。