메뉴 건너뛰기




Volumn 17, Issue 1, 2004, Pages 43-77

Constructing locally computable extractors and cryptosystems in the bounded-storage model

Author keywords

Averaging samplers; Bounded storage model; Everlasting security; Expander graphs; Extractors; Space bounded adversaries; Unconditional security

Indexed keywords

AVERAGING SAMPLERS; BOUNDED STORAGE MODELS; EVERLASTING SECURITY; EXPANDER GRAPHS; EXTRACTORS; SPACE BOUNDED ADVERSARIES; UNCONDITIONAL SECURITY;

EID: 4344628859     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-003-0237-x     Document Type: Article
Times cited : (116)

References (44)
  • 1
    • 0036612020 scopus 로고    scopus 로고
    • Everlasting security in the bounded storage model
    • [ADR], June
    • [ADR] Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668-1680, June 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.6 , pp. 1668-1680
    • Aumann, Y.1    Ding, Y.Z.2    Rabin, M.O.3
  • 2
    • 84957084138 scopus 로고    scopus 로고
    • Information theoretically secure communication in the limited storage space model
    • [AR], 15-19 August 1999, Volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • [AR] Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Advances in Cryptology - CRYPTO '99, 15-19 August 1999, pages 65-79. Volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , pp. 65-79
    • Aumann, Y.1    Rabin, M.O.2
  • 3
    • 0003430191 scopus 로고
    • [ASE]. Wiley-Interscience Series in Discrete Mathematics and Optimization. Wiley, New York
    • [ASE] Noga Alon, Joel H. Spencer, and Paul Erdös. The Probabilistic Method. Wiley-Interscience Series in Discrete Mathematics and Optimization. Wiley, New York, 1992.
    • (1992) The Probabilistic Method
    • Alon, N.1    Spencer, J.H.2    Erdös, P.3
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • [BBR]. Special issue on cryptography
    • [BBR] Charles H. Bennett, Gilles Brassard, and Jean-Marc Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988. Special issue on cryptography.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 8
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • [BY]. In M. Joye, editor, Volume 2612 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • [BY] Mihir Bellare and Bennet Yee. Forward-security in private-key cryptography. In M. Joye, editor, Topics in Cryptology - CT-RSA 03, pages 1-18. Volume 2612 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2003.
    • (2003) Topics in Cryptology - CT-RSA 03 , pp. 1-18
    • Bellare, M.1    Yee, B.2
  • 9
    • 0029220110 scopus 로고
    • Lower bounds for sampling algorithms for estimating the average
    • [CEG], January
    • [CEG] Ran Canetti, Guy Even, and Oded Goldreich. Lower bounds for sampling algorithms for estimating the average. Information Processing Letters, 53(1):17-25, January 1995.
    • (1995) Information Processing Letters , vol.53 , Issue.1 , pp. 17-25
    • Canetti, R.1    Even, G.2    Goldreich, O.3
  • 10
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • [CG1], April
    • [CG1] Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 0002739272 scopus 로고
    • On the power of two-point based sampling
    • [CG2]
    • [CG2] Benny Chor and Oded Goldreich. On the power of two-point based sampling. Journal of Complexity, 5(1):96-106, 1989.
    • (1989) Journal of Complexity , vol.5 , Issue.1 , pp. 96-106
    • Chor, B.1    Goldreich, O.2
  • 12
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • [CM]. In Burton S. Kaliski Jr., editor, Volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • [CM] Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptotogy - CRYPTO '97, pages 292-306. Volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1997.
    • (1997) Advances in Cryptotogy - CRYPTO '97 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 13
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • [DM], this issue
    • [DM] Stefan Dziembowski and Ueli Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, this issue, pp. 5-26.
    • Journal of Cryptology , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 14
    • 84937431717 scopus 로고    scopus 로고
    • Hyper-encryption and everlasting security (extended abstract)
    • [DR], 14-16 March 2002, Volume 2285 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • [DR] Yan Zong Ding and Michael O. Rabin. Hyper-encryption and everlasting security (extended abstract). In STACS 2002 - 19th Annual Symposium on Theoretical Aspects of Computer Science, 14-16 March 2002, pages 1-26. Volume 2285 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
    • (2002) STACS 2002 - 19th Annual Symposium on Theoretical Aspects of Computer Science , pp. 1-26
    • Ding, Y.Z.1    Rabin, M.O.2
  • 15
    • 4344576266 scopus 로고    scopus 로고
    • Concentration of measure for randomized algorithms: Techniques and analysis
    • [DS]. In S. Rajasekaran et al., editor, Volume I, chapter 3, Kluwer, Dordrecht
    • [DS] Devdatt Dubhashi and Sandeep Sen. Concentration of measure for randomized algorithms: techniques and analysis. In S. Rajasekaran et al., editor, Handbook of Randomized Computing, Volume I, chapter 3, pages 35-100. Kluwer, Dordrecht, 2001.
    • (2001) Handbook of Randomized Computing , pp. 35-100
    • Dubhashi, D.1    Sen, S.2
  • 16
    • 0000646152 scopus 로고    scopus 로고
    • A Chernoff bound for random walks on expander graphs
    • [G1] electronic
    • [G1] David Gillman. A Chernoff bound for random walks on expander graphs. SIAM Journal on Computing, 27(4): 1203-1220 (electronic), 1998.
    • (1998) SIAM Journal on Computing , vol.27 , Issue.4 , pp. 1203-1220
    • Gillman, D.1
  • 17
    • 0003205419 scopus 로고    scopus 로고
    • A sample of samplers: A computational perspective on sampling
    • [G2], Electronic Colloquium on Computational Complexity, May
    • [G2] Oded Goldreich. A Sample of Samplers: A Computational Perspective on Sampling. Technical Report TR97-020, Electronic Colloquium on Computational Complexity, May 1997.
    • (1997) Technical Report , vol.TR97-020
    • Goldreich, O.1
  • 18
    • 0000871697 scopus 로고
    • Explicit constructions of linear-sized superconcentrators
    • [GG], June
    • [GG] Ofer Gabber and Zvi Galil. Explicit constructions of linear-sized superconcentrators. Journal of Computer and System Sciences, 22(3):407-420, June 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 407-420
    • Gabber, O.1    Galil, Z.2
  • 19
    • 0031504510 scopus 로고    scopus 로고
    • Tiny families of functions with random properties: A quality-size trade-off for hashing
    • [GW]
    • [GW] Oded Goldreich and Avi Wigderson. Tiny families of functions with random properties: a quality-size trade-off for hashing. Random Structures & Algorithms, 11(4):315-343, 1997.
    • (1997) Random Structures & Algorithms , vol.11 , Issue.4 , pp. 315-343
    • Goldreich, O.1    Wigderson, A.2
  • 20
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • [HILL] (electronic)
    • [HILL] Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4): 1364-1396 (electronic), 1999.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 21
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • [L], this issue
    • [L] Chi-Jen Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, this issue, pp. 27-42.
    • Journal of Cryptology , pp. 27-42
    • Lu, C.-J.1
  • 23
    • 0000789645 scopus 로고
    • Explicit constructions of expanders
    • [M1]
    • [M1] G. A. Margulis. Explicit constructions of expanders. Problemy Peredči Informacii, 9(4):71-80, 1973.
    • (1973) Problemy Peredči Informacii , vol.9 , Issue.4 , pp. 71-80
    • Margulis, G.A.1
  • 24
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • [M2]
    • [M2] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 25
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • [M3]
    • [M3] Ueli M. Maurer. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 26
    • 0000947929 scopus 로고
    • Pseudorandom generators for space-bounded computation
    • [N]
    • [N] Noam Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449-461, 1992.
    • (1992) Combinatorica , vol.12 , Issue.4 , pp. 449-461
    • Nisan, N.1
  • 27
    • 0033075850 scopus 로고    scopus 로고
    • Extracting randomness: A survey and new constructions
    • [NT]
    • [NT] Noam Nisan and Amnon Ta-Shma. Extracting randomness: a survey and new constructions. Journal of Computer and System Sciences, 58(1):148-173, 1999.
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.1 , pp. 148-173
    • Nisan, N.1    Ta-Shma, A.2
  • 29
    • 4344563885 scopus 로고    scopus 로고
    • [R]. Personal communication, December
    • [R] Michael O. Rabin. Personal communication, December 2001.
    • (2001)
    • Rabin, M.O.1
  • 30
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • [RT] (electronic)
    • [RT] Jaikumar Radhakrishnan and Amnon Ta-Shma. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Discrete Mathematics, 13(1):2-24 (electronic), 2000.
    • (2000) SIAM Journal on Discrete Mathematics , vol.13 , Issue.1 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 31
    • 0038309373 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in Trevisan's extractors
    • [RRV]
    • [RRV] Ran Raz, Omer Reingold, and Salil Vadhan. Extracting all the randomness and reducing the error in Trevisan's extractors. Journal of Computer and System Sciences, 65(1):97-128, 2002.
    • (2002) Journal of Computer and System Sciences , vol.65 , Issue.1 , pp. 97-128
    • Raz, R.1    Reingold, O.2    Vadhan, S.3
  • 35
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • [S2]
    • [S2] Claude E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 36
    • 0031654488 scopus 로고    scopus 로고
    • Explicit OR-dispersers with polylogarithmic degree
    • [SSZ], January
    • [SSZ] Michael Saks, Aravind Srinivasan, and Shiyu Zhou. Explicit OR-dispersers with polylogarithmic degree. Journal of the ACM, 45(1): 123-154, January 1998.
    • (1998) Journal of the ACM , vol.45 , Issue.1 , pp. 123-154
    • Saks, M.1    Srinivasan, A.2    Zhou, S.3
  • 38
    • 0036435072 scopus 로고    scopus 로고
    • Almost optimal dispersers
    • [T1]
    • [T1] Amnon Ta-Shma. Almost optimal dispersers. Combinatorica, 22(1):123-145, 2002.
    • (2002) Combinatorica , vol.22 , Issue.1 , pp. 123-145
    • Ta-Shma, A.1
  • 39
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • [T2], July
    • [T2] Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4): 860-879, July 2001.
    • (2001) Journal of the ACM , vol.48 , Issue.4 , pp. 860-879
    • Trevisan, L.1
  • 41
    • 0037972079 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • [V1]
    • [V1] Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002/162, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.162
    • Vadhan, S.P.1
  • 42
    • 35248849411 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • [V2]. In Dan Boneh, editor, 17-21 August 2003, Volume 2729 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
    • [V2] Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. In Dan Boneh, editor, Advances in Cryptology - CRYPTO '03, 17-21 August 2003, pages 61-77. Volume 2729 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2003.
    • (2003) Advances in Cryptology - CRYPTO '03 , pp. 61-77
    • Vadhan, S.P.1
  • 43
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • [Z1], October/November
    • [Z1] David Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, October/November 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1
  • 44
    • 0031507665 scopus 로고    scopus 로고
    • Randomness-optimal oblivious sampling
    • [Z2]
    • [Z2] David Zuckerman. Randomness-optimal oblivious sampling. Random Structures & Algorithms, 11(4):345-367, 1997.
    • (1997) Random Structures & Algorithms , vol.11 , Issue.4 , pp. 345-367
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.