메뉴 건너뛰기




Volumn 4948 LNCS, Issue , 2008, Pages 55-72

Basing weak public-key cryptography on strong one-way functions

Author keywords

Bounded storage model; Merkle's puzzles; One way functions; Public key cryptography; Quantum computing

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; FUNCTION EVALUATION; FUNCTIONS; HEURISTIC ALGORITHMS; HEURISTIC METHODS; HEURISTIC PROGRAMMING; LAWS AND LEGISLATION; LEARNING ALGORITHMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; QUADRATIC PROGRAMMING; QUANTUM COMPUTERS; SECURITY OF DATA; SLITTING MACHINES; STORAGE (MATERIALS);

EID: 40349087309     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78524-8_4     Document Type: Conference Paper
Times cited : (19)

References (23)
  • 1
    • 84974588386 scopus 로고    scopus 로고
    • Timed Commitments
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Boneh, D., Naor, M.: Timed Commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 2
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional Security Against Memory-Bounded Adversaries
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Cachin, C. Maurer, U.: Unconditional Security Against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 3
    • 85069084234 scopus 로고    scopus 로고
    • Ding, Y., Harnik, D., Shltiel, R., Rosen, A.: Constant-Round Oblivious Transfer in the Bounded Storage Model. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, Springer, Heidelberg (2004)
    • Ding, Y., Harnik, D., Shltiel, R., Rosen, A.: Constant-Round Oblivious Transfer in the Bounded Storage Model. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, Springer, Heidelberg (2004)
  • 4
    • 33748094970 scopus 로고    scopus 로고
    • On the randomness complexity of efficient sampling
    • Dubrov, B., Ishai, Y.: On the randomness complexity of efficient sampling. In: Proceedings of STOC 2006, pp. 711-720 (2006)
    • (2006) Proceedings of STOC 2006 , pp. 711-720
    • Dubrov, B.1    Ishai, Y.2
  • 5
    • 0033294770 scopus 로고    scopus 로고
    • Rigorous Time/Space Trade-offs for Inverting Functions
    • Fiat, A., Naor, M.: Rigorous Time/Space Trade-offs for Inverting Functions. SIAM J. Comput. 29(3), 790-803 (1999)
    • (1999) SIAM J. Comput , vol.29 , Issue.3 , pp. 790-803
    • Fiat, A.1    Naor, M.2
  • 8
    • 0024868772 scopus 로고
    • A Hard-Core Predicate for all One-Way Functions
    • Goldreich, O., Levin, L.: A Hard-Core Predicate for all One-Way Functions. In: STOC 1989, pp. 25-32 (1989)
    • (1989) STOC 1989 , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 9
    • 17744387205 scopus 로고
    • On Yao's XOR lemma
    • Technical Report TR95-50, Electronic Colloquium, on Computational Complexity
    • Goldreich, O., Nisan, N., Wigderson, A.: On Yao's XOR lemma. Technical Report TR95-50, Electronic Colloquium, on Computational Complexity (1995)
    • (1995)
    • Goldreich, O.1    Nisan, N.2    Wigderson, A.3
  • 11
    • 33746342808 scopus 로고    scopus 로고
    • Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Haitner, I., Harnik, D., Reingold, O.: Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 228-239. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 228-239
    • Haitner, I.1    Harnik, D.2    Reingold, O.3
  • 12
  • 13
    • 34848917325 scopus 로고    scopus 로고
    • Key Agreement from Weak Bit Agreement
    • Holenstein, T.: Key Agreement from Weak Bit Agreement. In: Proceedings of STOC 2005, pp. 664-673 (2005)
    • (2005) Proceedings of STOC 2005 , pp. 664-673
    • Holenstein, T.1
  • 14
    • 33745580685 scopus 로고    scopus 로고
    • Holenstein, T.: Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 443-461. Springer, Heidelberg (2006)
    • Holenstein, T.: Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 443-461. Springer, Heidelberg (2006)
  • 17
    • 51249173191 scopus 로고    scopus 로고
    • Levin, L.A.: One-Way Functions and Pseudorandom Generators. Combinatorica 7(4), 357-363 (1987) Earlier version in STOC 1985
    • Levin, L.A.: One-Way Functions and Pseudorandom Generators. Combinatorica 7(4), 357-363 (1987) Earlier version in STOC 1985
  • 18
    • 0026698501 scopus 로고
    • Conditionally-Perfect Secrecy and a Provably Secure Randomized Cipher
    • Maurer, U.: Conditionally-Perfect Secrecy and a Provably Secure Randomized Cipher. Journal of Cryptology 5(1), 53-66 (1992)
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 19
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • Merkle, R.: Secure communications over insecure channels. CACM, 294-299 (April 1978)
    • (1978) CACM , vol.294-299
    • Merkle, R.1
  • 20
    • 35048815001 scopus 로고    scopus 로고
    • Reingold, O., Trevisan, L., Vadhan, S.: Notions of Reducibility between Cryptgraphic Primitives. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 1-20. Springer, Heidelberg (2004)
    • Reingold, O., Trevisan, L., Vadhan, S.: Notions of Reducibility between Cryptgraphic Primitives. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 1-20. Springer, Heidelberg (2004)
  • 21
    • 85069060084 scopus 로고    scopus 로고
    • Rudich, S, Limits on the Provable Consequences of One-way Functions. Ph.D. thesis
    • Rudich, S.: Limits on the Provable Consequences of One-way Functions. Ph.D. thesis
  • 22
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantom Computer
    • Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantom Computer. SIAM J. Comp. 26(5), 1484-1509 (1997)
    • (1997) SIAM J. Comp , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 23
    • 33745541383 scopus 로고    scopus 로고
    • On obfuscating point functions
    • Wee, H.: On obfuscating point functions. In: STOC 2005, pp. 523-532 (2005)
    • (2005) STOC 2005 , pp. 523-532
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.