# Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium

@inproceedings{Garg2016RevisitingTC,
title={Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium},
author={Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan},
booktitle={CRYPTO},
year={2016}
}
• Published in CRYPTO 14 August 2016
• Mathematics, Computer Science
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic game theory. This problem is complete for the complexity class PPAD. It is well known that problems in PPAD cannot be $$\mathrm {NP}$$ -complete unless $$\mathrm {NP}=\mathrm {coNP}$$ . Therefore, a natural direction is to reduce the hardness of PPAD to the hardness of problems used in cryptography. Bitansky, Paneth, and Rosen [FOCS 2015] prove the hardness of PPAD assuming the existence of quasi…
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
• Mathematics, Computer Science
IACR Cryptol. ePrint Arch.
• 2019
It is shown that solving the END−OF−METERED−LINE problem is no easier than breaking the soundness of the Fiat-Shamir transformation when applied to the sumcheck protocol, and opens up the possibility of sampling moderately-sized games for which it is hard to find a Nash equilibrium.
The Journey from NP to TFNP Hardness
• Computer Science, Mathematics
ITCS
• 2016
This work shows that hard-on-average TFNP problems can be based on the weak assumption that there exists a hard- on-average language in NP, in particular, this includes the assumption of the existence of one-way functions.
PPAD-Hardness via Iterated Squaring Modulo a Composite
• Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
• 2019
We show that, relative to a random oracle, solving the End-of-Line problem (which is PPAD-complete) is no easier than computing the function f(N, x, T ) = x T mod N, where N is an n-bit RSA modulus,
On Average-Case Hardness in TFNP from One-Way Functions
• Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
• 2020
The interplay between TFNP and OWFs is further explored and the first negative results are given, showing that there cannot exist constructions of average-case hard TFNP problem from OWFs with a certain type of simple black-box security reductions.
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
• Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
• 2020
A succinct non-interactive publicly-verifiable delegation scheme for any log-space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption, and introduces a new cryptographic primitive: a lossy correlation-intractable hash function family.
Hardness of Continuous Local Search: Query Complexity and Cryptographic Lower Bounds
• Computer Science, Mathematics
SODA
• 2016
The first hardness results for CLS are shown, showing instances for which any (computationally unbounded) randomized algorithm must perform exponentially many queries in order to find a local optimum and hardness for computationally bounded algorithms under cryptographic assumptions.
On the Cryptographic Hardness of Local Search
• Computer Science, Mathematics
ITCS
• 2020
The core observation behind the results is that the unique proofs property of incrementally-verifiable computations previously used to demonstrate hardness in PLS can be traded with a simple incremental completeness property.
PPP-Completeness with Connections to Cryptography
• Computer Science, Mathematics
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS)
• 2018
This work identifies the first PPP-complete problem without any circuit or Turing Machine given explicitly in the input, and thus answers a longstanding open question from [Papadimitriou1994].
Hardness of Approximation Between P and NP
• A. Rubinstein
• Computer Science
Hardness of Approximation Between P and NP
• 2017
This book provides strong evidence that even finding an approximate Nash equilibrium is intractable, and proves several intractability theorems for different settings (two-player games and many- player games) and models (computational complexity, query complexity, and communication complexity).
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
• Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
• 2020
A succinct non-interactive publicly-verifiable delegation scheme for any log-space uniform circuit under the sub-exponential LWE assumption, and proves the soundness of the Fiat-Shamir heuristic when applied to a specific (non-succinct) zero-knowledge protocol.

## References

SHOWING 1-10 OF 49 REFERENCES
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium
• Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
• 2015
The first result proves hardness of PPAD assuming the existence of polynomially hard indistinguishability obfuscation (iO) and one-way permutations and shows that PPAD hardness can be based on polynmially hard public key functional encryption and oneway permutations.
On the Cryptographic Hardness of Finding a Nash Equilibrium
• Computer Science, Mathematics
FOCS
• 2015
We prove that finding a Nash equilibrium of a game is hard, assuming the existence of indistinguishability obfuscation and one-way functions with sub-exponential hardness. We do so by showing how
Settling the complexity of computing two-player Nash equilibria
• Computer Science, Mathematics
JACM
• 2009
We prove that Bimatrix, the problem of finding a Nash equilibrium in a two-player game, is complete for the complexity class PPAD (Polynomial Parity Argument, Directed version) introduced by
Hardness of Continuous Local Search: Query Complexity and Cryptographic Lower Bounds
• Computer Science, Mathematics
SODA
• 2016
The first hardness results for CLS are shown, showing instances for which any (computationally unbounded) randomized algorithm must perform exponentially many queries in order to find a local optimum and hardness for computationally bounded algorithms under cryptographic assumptions.
Breaking the Sub-Exponential Barrier in Obfustopia
• Computer Science, Physics
EUROCRYPT
• 2016
A major challenge in this direction of research is to develop novel techniques for usingIndistinguishability obfuscation since $$i\mathcal {O}$$ by itself offers virtually no protection for secret information in the underlying programs.
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
• Mathematics, Computer Science
2015 IEEE 56th Annual Symposium on Foundations of Computer Science
• 2015
This work provides the first construction of general-purpose indistinguishability obfuscation proven secure via a reduction to a natural computational assumption over multilinear maps, namely, the MultilInear Subgroup Elimination Assumption.
A hard-core predicate for all one-way functions
• Mathematics, Computer Science
STOC '89
• 1989
This paper proves a conjecture of [Levin 87, sec. 5.6.2] that the scalar product of Boolean vectors p, g, x is a hard-core of every one-way function ƒ, and extends to multiple (up to the logarithm of security) such bits and to any distribution on the <italic>x</italic>.
On the (Im)possibility of Obfuscating Programs
It is proved that obfuscation is impossible, by constructing a family of functions F that are inherently unobfuscatable in the following sense: there is a property π : F → {0, 1} such that given any program that computes a function f ∈ F, the value π(f) can be efficiently computed.
On the Complexity of the Parity Argument and Other Inefficient Proofs of Existence
We define several new complexity classes of search problems, ''between'' the classes FP and FNP. These new classes are contained, along with factoring, and the class PLS, in the class TFNP of search
Integer factoring and modular square roots
• Emil Jerábek
• Computer Science, Mathematics
J. Comput. Syst. Sci.
• 2016
Buresh-Oppenheim proved that the NP search problem to find nontrivial factors of integers of a special form belongs to Papadimitriou's class PPA, and is probabilistically reducible to a problem in