메뉴 건너뛰기




Volumn , Issue , 2004, Pages 196-205

On the (Im)possibility of cryptography with imperfect randomness

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY SOURCES; NON-TRIVIAL FUNCTION; RANDOMNESS; SECURE SIGNATURES SCHEMES;

EID: 17744370165     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (88)

References (49)
  • 1
    • 0002128548 scopus 로고
    • The influence of large coalitions
    • M. Ajtai and N. Linial. The influence of large coalitions. Combinatorica, 13(2): 129-145, 1993.
    • (1993) Combinatorica , vol.13 , Issue.2 , pp. 129-145
    • Ajtai, M.1    Linial, N.2
  • 2
    • 0023995534 scopus 로고
    • Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes
    • L. Babai and S. Moran. Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes. J. Comput. Syst. Sci., 36(2):254-276, 1988.
    • (1988) J. Comput. Syst. Sci. , vol.36 , Issue.2 , pp. 254-276
    • Babai, L.1    Moran, S.2
  • 4
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Proc. CRYPTO '99, pages 80-97, 1999.
    • (1999) Proc. CRYPTO '99 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 6
    • 33749228136 scopus 로고
    • Randomness-efficient oblivious sampling
    • M. Bellare and J. Rompel. Randomness-efficient oblivious sampling. In Proc. 35th FOCS, pages 276-287, 1994.
    • (1994) Proc. 35th FOCS , pp. 276-287
    • Bellare, M.1    Rompel, J.2
  • 8
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Comput., 17(2):210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 9
    • 51249178917 scopus 로고
    • Independent unbiased coin flips from a correlated biased source - A finite state Markov chain
    • M. Blum. Independent unbiased coin flips from a correlated biased source - a finite state Markov chain. Combinatoria, 6(2):97-108, 1986.
    • (1986) Combinatoria , vol.6 , Issue.2 , pp. 97-108
    • Blum, M.1
  • 10
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications
    • M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proc. 20th STOC, pages 103-112, 1988.
    • (1988) Proc. 20th STOC , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 12
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 14
    • 17744385598 scopus 로고    scopus 로고
    • Improved randomness extraction from two independent sources
    • Y. Dodis, A. Elbaz, R. Oliveira, and R. Raz. Improved randomness extraction from two independent sources. In Proc. RANDOM '04, 2004.
    • (2004) Proc. RANDOM '04
    • Dodis, Y.1    Elbaz, A.2    Oliveira, R.3    Raz, R.4
  • 15
    • 30744451262 scopus 로고    scopus 로고
    • On extracting private randomness over a public channel
    • Y. Dodis and R. Oliveira. On extracting private randomness over a public channel. In Proc. RANDOM '03, pages 252-263, 2003.
    • (2003) Proc. RANDOM '03 , pp. 252-263
    • Dodis, Y.1    Oliveira, R.2
  • 16
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. EUROCRYPT '04, pages 523-540, 2004.
    • (2004) Proc. EUROCRYPT '04 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 17
    • 84945116168 scopus 로고    scopus 로고
    • On perfect and adaptive security in exposure-resilient cryptography
    • Y. Dodis, A. Sahai, and A. Smith. On perfect and adaptive security in exposure-resilient cryptography. In Proc. EUROCRYPT '01, pages 301-324, 2001.
    • (2001) Proc. EUROCRYPT '01 , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 18
    • 0036957025 scopus 로고    scopus 로고
    • On the (non)universality of the one-time pad
    • Y. Dodis and J. Spencer. On the (non)universality of the one-time pad. In Proc. 43rd FOCS, pages 376-388, 2002.
    • (2002) Proc. 43rd FOCS , pp. 376-388
    • Dodis, Y.1    Spencer, J.2
  • 19
    • 0012578418 scopus 로고
    • The efficient construction of an unbiased random sequence
    • P. Elias. The efficient construction of an unbiased random sequence. Ann. Math. Stat., 43(2):865-870, 1972.
    • (1972) Ann. Math. Stat. , vol.43 , Issue.2 , pp. 865-870
    • Elias, P.1
  • 20
    • 0342733642 scopus 로고    scopus 로고
    • Multiple non-interactive zero knowledge proofs under general assumptions
    • U. Feige, D. Lapidot, and A. Shamir. Multiple non-interactive zero knowledge proofs under general assumptions. SIAM J. Comput., 29(1): 1-28, 1999.
    • (1999) SIAM J. Comput. , vol.29 , Issue.1 , pp. 1-28
    • Feige, U.1    Lapidot, D.2    Shamir, A.3
  • 21
    • 0003979335 scopus 로고    scopus 로고
    • Cambridge University Press, Cambridge, Basic applications
    • O. Goldreich. Foundations of cryptography, volume 2. Cambridge University Press, Cambridge, 2004. Basic applications.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 22
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229, 1987.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM, 38(1):691-729, 1991.
    • (1991) J. ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 24
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. Cryptology, 7(1): 1-32, 1994.
    • (1994) J. Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 25
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 26
    • 0001796243 scopus 로고
    • Private coins versus public coins in interactive proof systems
    • S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. Advances in Computing Research, 5:73-90, 1989.
    • (1989) Advances in Computing Research , vol.5 , pp. 73-90
    • Goldwasser, S.1    Sipser, M.2
  • 27
    • 85028775577 scopus 로고
    • Direct minimum-knowledge computations
    • R. Impagliazzo and M. Yung. Direct minimum-knowledge computations. In Proc. CRYPTO '87, pages 40-51, 1987.
    • (1987) Proc. CRYPTO '87 , pp. 40-51
    • Impagliazzo, R.1    Yung, M.2
  • 28
    • 0344981502 scopus 로고    scopus 로고
    • Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
    • J. Kamp and D. Zuckerman. Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In Proc. 35th FOCS, pages 92-101, 2003.
    • (2003) Proc. 35th FOCS , pp. 92-101
    • Kamp, J.1    Zuckerman, D.2
  • 29
    • 84937425036 scopus 로고    scopus 로고
    • A new aspect for security notions: Secure randomness in public-key encryption schemes
    • T. Koshiba. A new aspect for security notions: Secure randomness in public-key encryption schemes. In Proc. 4th PKC, pages 87-103, 2001.
    • (2001) Proc. 4th PKC , pp. 87-103
    • Koshiba, T.1
  • 30
    • 84958973302 scopus 로고    scopus 로고
    • On sufficient randomness for secure public-key cryptosystems
    • T. Koshiba. On sufficient randomness for secure public-key cryptosystems. In Proc. 5th PKC, pages 34-47, 2002.
    • (2002) Proc. 5th PKC , pp. 34-47
    • Koshiba, T.1
  • 31
    • 0012523366 scopus 로고
    • Some extremal problems arising from discrete control processes
    • D. Lichtenstein, N. Linial, and M. Saks. Some extremal problems arising from discrete control processes. Combinatorica, 9(3):269-287, 1989.
    • (1989) Combinatorica , vol.9 , Issue.3 , pp. 269-287
    • Lichtenstein, D.1    Linial, N.2    Saks, M.3
  • 33
    • 0026930922 scopus 로고
    • Algebraic methods for interactive proof systems
    • C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof systems. J. ACM, 39(4):859-868, 1992.
    • (1992) J. ACM , vol.39 , Issue.4 , pp. 859-868
    • Lund, C.1    Fortnow, L.2    Karloff, H.3    Nisan, N.4
  • 34
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In Proc. CRYPTO '97, pages 307-321, 1997.
    • (1997) Proc. CRYPTO '97 , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 35
    • 84977114496 scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • J. L. McInnes and B. Pinkas. On the impossibility of private key cryptography with weakly random keys. In Proc. CRYPTO '90, pages 421-436, 1991.
    • (1991) Proc. CRYPTO '90 , pp. 421-436
    • McInnes, J.L.1    Pinkas, B.2
  • 36
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21th STOC, pages 33-43, 1988.
    • (1988) Proc. 21th STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 37
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, 1996.
    • (1996) J. Comput. Syst. Sci. , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 39
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret
    • R. Renner and S. Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In Proc. CRYPTO '03, pages 78-95, 2003.
    • (2003) Proc. CRYPTO '03 , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 40
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci., 33(1):75-87, 1986.
    • (1986) J. Comput. Syst. Sci. , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 41
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 42
    • 0026930543 scopus 로고
    • IP = PSPACE
    • A. Shamir. IP = PSPACE. J. ACM, 39(4):869-877, 1992.
    • (1992) J. ACM , vol.39 , Issue.4 , pp. 869-877
    • Shamir, A.1
  • 43
    • 0034505540 scopus 로고    scopus 로고
    • Extracting randomness from samplable distributions
    • L. Trevisan and S. Vadhan. Extracting randomness from samplable distributions. In Proc. 41st FOCS, pages 32-42, 2000.
    • (2000) Proc. 41st FOCS , pp. 32-42
    • Trevisan, L.1    Vadhan, S.2
  • 44
    • 0023573599 scopus 로고
    • Efficiency considerations in using semi-random sources
    • U. V. Vazirani. Efficiency considerations in using semi-random sources. In Proc. 19th STOC, pages 160-168, 1987.
    • (1987) Proc. 19th STOC , pp. 160-168
    • Vazirani, U.V.1
  • 45
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
    • U. V. Vazirani. Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources. Combinatorial, 7(4):375-392, 1987.
    • (1987) Combinatorial , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.V.1
  • 46
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • U. V. Vazirani and V. V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. 26th FOCS, pages 417-428, 1985.
    • (1985) Proc. 26th FOCS , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 48
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5): 367-391, 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1
  • 49
    • 0031507665 scopus 로고    scopus 로고
    • Randomness-optimal oblivious sampling
    • D. Zuckerman. Randomness-optimal oblivious sampling. Random. Struct. Algor, 11(4):345-367, 1997.
    • (1997) Random. Struct. Algor , vol.11 , Issue.4 , pp. 345-367
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.