메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 1-20

Does privacy require true randomness?

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MESSAGE PASSING; PUBLIC KEY CRYPTOGRAPHY; RANDOM PROCESSES;

EID: 38049035373     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_1     Document Type: Conference Paper
Times cited : (26)

References (20)
  • 1
    • 0033341167 scopus 로고    scopus 로고
    • Dispersers, deterministic amplification, and weak random sources
    • Alexander Andreev, Andrea Clementi, Jose Rolim, and Luca Trevisan. Dispersers, deterministic amplification, and weak random sources. SIAM J. on Computing, 28(6):2103-2116, 1999.
    • (1999) SIAM J. on Computing , vol.28 , Issue.6 , pp. 2103-2116
    • Andreev, A.1    Clementi, A.2    Rolim, J.3    Trevisan, L.4
  • 2
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. on Computing, 17(2):230-261, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 3
    • 38049036626 scopus 로고    scopus 로고
    • Yevgeniy Dodis. Exposure-Resilient Cryptography (PhD Thesis). MIT PhD Thesis, 2000.
    • Yevgeniy Dodis. Exposure-Resilient Cryptography (PhD Thesis). MIT PhD Thesis, 2000.
  • 4
    • 17744370165 scopus 로고    scopus 로고
    • On the (im)possibility of cryptography with imperfect randomness
    • Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, and Amit Sahai. On the (im)possibility of cryptography with imperfect randomness. In Proc. 45th IEEE FOCS, pages 196-205, 2004.
    • (2004) Proc. 45th IEEE FOCS , pp. 196-205
    • Dodis, Y.1    Jin Ong, S.2    Prabhakaran, M.3    Sahai, A.4
  • 6
    • 0036957025 scopus 로고    scopus 로고
    • On the (non-)universality of the one-time pad
    • Yevgeniy Dodis and Joel Spencer. On the (non-)universality of the one-time pad. In Proc. 43rd IEEE FOCS, pages 376-388, 2002.
    • (2002) Proc. 43rd IEEE FOCS , pp. 376-388
    • Dodis, Y.1    Spencer, J.2
  • 7
    • 84945116168 scopus 로고    scopus 로고
    • On perfect and adaptive security in exposure-resilient cryptography
    • Yevgeniy Dodis, Amit Sahai, and Adam Smith. On perfect and adaptive security in exposure-resilient cryptography. In Proc. EUROCRYPT'01, pages 301-324, 2001.
    • (2001) Proc. EUROCRYPT'01 , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 8
    • 0024868772 scopus 로고
    • A Hard-Core Predicate for all One-Way Functions
    • Oded Goldreich and Leonid Levin. A Hard-Core Predicate for all One-Way Functions. In Prof. STOC, pp. 25-32, 1989.
    • (1989) Prof. STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 9
    • 33748100350 scopus 로고    scopus 로고
    • Deterministic extractors for small-space sources
    • Jesse Kamp, Anup Rao, Salil Vadhan and David Zuckerman. Deterministic extractors for small-space sources. In Proc of STOC, pp. 691-700, 2006.
    • (2006) Proc of STOC , pp. 691-700
    • Kamp, J.1    Rao, A.2    Vadhan, S.3    Zuckerman, D.4
  • 10
    • 0012524233 scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • James L. McInnes and Benny Pinkas. On the impossibility of private key cryptography with weakly random keys. In Proc. CRYPTO'90, pages 421-436, 1990.
    • (1990) Proc. CRYPTO'90 , pp. 421-436
    • McInnes, J.L.1    Pinkas, B.2
  • 11
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • Ueli Maurer and Stefan Wolf. Privacy amplification secure against active adversaries. In Proc. CRYPTO'97, pages 307-321, 1997.
    • (1997) Proc. CRYPTO'97 , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 12
    • 0000845043 scopus 로고
    • Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Proc. of CRYPTO, pp. 129-140, 1991.
    • (1991) Proc. of CRYPTO , pp. 129-140
    • Torben, P.1
  • 13
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrary weak secret
    • Renato Renner and Stefan Wolf. Unconditional authenticity and privacy from an arbitrary weak secret. In Proc. CRYPTO'03, pages 78-95, 2003.
    • (2003) Proc. CRYPTO'03 , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 14
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • Miklos Santha and Umesh V. Vazirani. Generating quasi-random sequences from semi-random sources. JCSS, 33(1):75-87, 1986.
    • (1986) JCSS , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 15
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy systems
    • Claude Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949.
    • (1949) Bell Systems Technical J , vol.28 , pp. 656-715
    • Shannon, C.1
  • 16
    • 38049030428 scopus 로고
    • Linear Algebra and Its Applications
    • London
    • Gilbert Strang. Linear Algebra and Its Applications. Academic Press, London, 1980.
    • (1980) Academic Press
    • Strang, G.1
  • 17
    • 0034505540 scopus 로고    scopus 로고
    • Extracting randomness from samplable distributions
    • Luca Trevisan and Salil Vadhan. Extracting randomness from samplable distributions. In Proc. 41st IEEE FOCS, pages 32-42, 2000.
    • (2000) Proc. 41st IEEE FOCS , pp. 32-42
    • Trevisan, L.1    Vadhan, S.2
  • 19
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • Umesh V. Vazirani and Vijay V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. 26th IEEE FOCS, pages 417-428, 1985.
    • (1985) Proc. 26th IEEE FOCS , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 20
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • David Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.