메뉴 건너뛰기




Volumn , Issue , 2003, Pages 417-425

Lower bounds on the efficiency of encryption and digital signature schemes

Author keywords

Black Box; Digital Signatures; Encryption; Lower Bounds

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBABILITY;

EID: 0037770046     PISSN: 07349025     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/780542.780604     Document Type: Conference Paper
Times cited : (30)

References (25)
  • 1
    • 0005343811 scopus 로고    scopus 로고
    • Collision-resistant hashing: Toward making UOWHFs practical
    • M. Bellare and P. Rogaway. Collision-resistant hashing: toward making UOWHFs practical. Crypto '97.
    • Crypto '97
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 0038384143 scopus 로고    scopus 로고
    • An efficient probabilistic encryption scheme which hides all partial information
    • M. Blum and S. Goldwasser. An efficient probabilistic encryption scheme which hides all partial information. Crypto '84.
    • Crypto '84
    • Blum, M.1    Goldwasser, S.2
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comp., 13(4): 850-864 (1984).
    • (1984) SIAM J. Comp. , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 6
    • 0037708003 scopus 로고    scopus 로고
    • On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function
    • M. Fischlin. On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function. CT-RSA 2002.
    • (2002) CT-RSA 2000
    • Fischlin, M.1
  • 7
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4): 469-472 (1985).
    • (1985) IEEE Transactions on Information Theory , vol.1 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 8
    • 0034496969 scopus 로고    scopus 로고
    • Lower bounds on the efficiency of generic cryptographic constructions
    • R. Gennaro and L. Trevisan. Lower bounds on the efficiency of generic cryptographic constructions. FOCS 2000.
    • (2000) FOCS 2000
    • Gennaro, R.1    Trevisan, L.2
  • 10
    • 0035172306 scopus 로고    scopus 로고
    • On the impossibility of basing trapdoor functions on trapdoor predicates
    • Y. Gertner, T. Malkin, and O. Reingold. On the impossibility of basing trapdoor functions on trapdoor predicates. FOCS 2001.
    • (2001) FOCS 2001
    • Gertner, Y.1    Malkin, T.2    Reingold, O.3
  • 11
    • 74049134548 scopus 로고    scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. STOC '89.
    • STOC '89
    • Goldreich, O.1    Levin, L.2
  • 13
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM J. Comp., 17(2): 281-308 (1988).
    • (1988) SIAM J. Comp. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 14
    • 85029660870 scopus 로고    scopus 로고
    • One-way functions are essential for complexity-based cryptography
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. FOCS '89.
    • FOCS '89
    • Impagliazzo, R.1    Luby, M.2
  • 15
    • 85066366869 scopus 로고    scopus 로고
    • Limits on the provable consequences of one-way permutations
    • R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. STOC '89.
    • STOC '89
    • Impagliazzo, R.1    Rudich, S.2
  • 16
    • 0033714443 scopus 로고    scopus 로고
    • A dual version of Reimer's inequality and a proof of Rudich's conjecture
    • J. Kahn, M. Saks, and C. Smyth. A dual version of Reimer's inequality and a proof of Rudich's conjecture. Computational Complexity 2000.
    • (2000) Computational Complexity
    • Kahn, J.1    Saks, M.2    Smyth, C.3
  • 17
    • 0032620951 scopus 로고    scopus 로고
    • Limits on the efficiency of one-way permutation-based hash functions
    • J. H. Kim, D. Simon, and P. Tetali. Limits on the efficiency of one-way permutation-based hash functions. FOCS '99.
    • FOCS '99
    • Kim, J.H.1    Simon, D.2    Tetali, P.3
  • 18
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one-way function
    • SRI International
    • L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1979.
    • (1979) Technical Report , vol.CSL-98
    • Lamport, L.1
  • 19
    • 84974533327 scopus 로고    scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. STOC '89.
    • STOC '89
    • Naor, M.1    Yung, M.2
  • 20
    • 0038384127 scopus 로고    scopus 로고
    • One-way functions are necessary and sufficient for digital signatures
    • J. Rompel. One-way functions are necessary and sufficient for digital signatures. STOC '90.
    • STOC '90
    • Rompel, J.1
  • 22
    • 0038384142 scopus 로고    scopus 로고
    • The use of interaction in public cryptosystems
    • S. Rudich. The use of interaction in public cryptosystems. Crypto '91.
    • Crypto '91
    • Rudich, S.1
  • 23
    • 1842461904 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • V. Shoup. A composition theorem for universal one-way hash functions. Eurocrypt 2000.
    • (2000) Eurocrypt
    • Shoup, V.1
  • 24
    • 0038722352 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • D. Simon. Finding collisions on a one-way street: can secure hash functions be based on general assumptions? Eurocrypt '98.
    • Eurocrypt '98
    • Simon, D.1
  • 25
    • 0020301290 scopus 로고    scopus 로고
    • Theory and applications of trapdoor functions
    • A. C. Yao. Theory and applications of trapdoor functions. FOCS '82.
    • FOCS '82
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.