Abstract
We investigate the question of what languages can be decided efficiently with the help of a recursive collision-finding oracle. Such an oracle can be used to break collision-resistant hash functions or, more generally, statistically hiding commitments. The oracle we consider, where is the recursion depth, is based on the identically-named oracle defined in the work of Haitner et al. (FOCS '07). Our main result is a constant-round public-coin protocol '' that allows an efficient verifier to emulate a oracle for any constant depth with the help of a prover. allows us to conclude that if is decidable by a -adaptive randomized oracle algorithm with access to a oracle, then . The above yields the following corollary: assume there exists an -adaptive reduction that bases constant-round statistically hiding commitment on -hardness, then and the polynomial hierarchy collapses. The same result holds for any primitive that can be broken by including collision-resistant hash functions and -round oblivious transfer where security holds statistically for one of the parties. We also obtain non-trivial (though weaker) consequences for -adaptive reductions for any . Prior to our work, most results in this research direction either applied only to non-adaptive reductions (\citeauthor{BogdanovT06}, SIAM J. of Comp. '06 and \citeauthor{AkaviaGGM06}, FOCS '06) or to one-way permutations (\citeauthor{Brassard79} FOCS '79). The main technical tool we use to prove the above is a new constant-round public-coin protocol (), which we believe to be of interest in its own right, that guarantees the following: given an efficient function on bits, let be the output distribution , then allows an efficient verifier Arthur to use an all-powerful prover Merlin's help to sample a random along with a good multiplicative approximation of the probability . The crucial feature of is that it extends even to distributions of the form , where is the uniform distribution on an efficiently decidable subset (such are called efficiently samplable with \emph{post-selection}), as long as the verifier is also given a good approximation of the value .