메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2752-2769

Cryptographic hardness based on the decoding of Reed-Solomon codes

Author keywords

Cryptographic primitives; Reed Solomon (RS) codes

Indexed keywords

CODES (STANDARDS); CODES (SYMBOLS); COMPUTER NETWORKS; CRYPTOGRAPHY; HARDNESS; INFORMATION THEORY; MICROFLUIDICS; NETWORK PROTOCOLS; NUMBER THEORY; NUMERICAL METHODS; POLYNOMIAL APPROXIMATION; POLYNOMIALS; RANDOM PROCESSES; RAPID SOLIDIFICATION; REED-SOLOMON CODES; SEMANTICS; SET THEORY;

EID: 45249087656     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921876     Document Type: Article
Times cited : (24)

References (29)
  • 1
    • 0001063035 scopus 로고    scopus 로고
    • Strengths and weaknesses of quantum computing
    • Oct
    • C. H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani, "Strengths and weaknesses of quantum computing," SIAM J. Comput., vol. 26, no. 5, pp. 1510-1523, Oct. 1997.
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1510-1523
    • Bennett, C.H.1    Bernstein, E.2    Brassard, G.3    Vazirani, U.4
  • 3
    • 0004089708 scopus 로고
    • Error correction of algebraic block codes,
    • U.S. Patent 4 633 470
    • E. R. Berlekamp and L. Welch, "Error correction of algebraic block codes," U.S. Patent 4 633 470, 1986.
    • (1986)
    • Berlekamp, E.R.1    Welch, L.2
  • 4
    • 34248585738 scopus 로고    scopus 로고
    • Decoding interleaved Reed-Solomon codes over noisy channels
    • D. Bleichenbacher, A. Kiayias, and M. Yung, "Decoding interleaved Reed-Solomon codes over noisy channels," Theor. Comput. Sci., vol. 379, no. 3, pp. 348-360, 2007.
    • (2007) Theor. Comput. Sci , vol.379 , Issue.3 , pp. 348-360
    • Bleichenbacher, D.1    Kiayias, A.2    Yung, M.3
  • 5
    • 84948951675 scopus 로고    scopus 로고
    • D. Bleichenbacher and P. Nguyen, Noisy polynomial interpolation and noisy Chinese remaindering, in Lecture Notes in Computer Science ser. 1807, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 53-69.
    • D. Bleichenbacher and P. Nguyen, "Noisy polynomial interpolation and noisy Chinese remaindering," in Lecture Notes in Computer Science ser. 1807, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 53-69.
  • 6
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag
    • M. Blum and S. Goldwasser, "An efficient probabilistic public-key encryption scheme which hides all partial information," in Lecture Notes in Computer Science, ser. 196, G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag, 1984.
    • (1984) Lecture Notes in Computer Science , vol.196
    • Blum, M.1    Goldwasser, S.2
  • 7
    • 0038447028 scopus 로고    scopus 로고
    • Reconstructing curves in three (and higher) dimensional space from noisy data
    • San Diego, CA, Jun. 9-11
    • D. Coppersmith and M. Sudan, "Reconstructing curves in three (and higher) dimensional space from noisy data," in Proc. 35th Annu. ACM Symp. Theory Comput., San Diego, CA, Jun. 9-11, 2003, pp. 136-142.
    • (2003) Proc. 35th Annu. ACM Symp. Theory Comput , pp. 136-142
    • Coppersmith, D.1    Sudan, M.2
  • 8
    • 0025430107 scopus 로고
    • A note on computational indistinguishability
    • O. Goldreich, "A note on computational indistinguishability," Inf. Process. Lett., vol. 34, no. 6, pp. 277-281, 1990.
    • (1990) Inf. Process. Lett , vol.34 , Issue.6 , pp. 277-281
    • Goldreich, O.1
  • 9
    • 0027306732 scopus 로고
    • A uniform complexity treatment of encryption and zero-knowledge
    • O. Goldreich, "A uniform complexity treatment of encryption and zero-knowledge," J. Cryptology, vol. 6, pp. 21-53, 1993.
    • (1993) J. Cryptology , vol.6 , pp. 21-53
    • Goldreich, O.1
  • 11
    • 0006238804 scopus 로고    scopus 로고
    • O. Goldreich, R. Rubinfeld, and M. Sudan, Learning polynomials with queries: The highly noisy case, SIAM J. Discrete Math., 13, no. 4, pp. 535-570, 2000.
    • O. Goldreich, R. Rubinfeld, and M. Sudan, "Learning polynomials with queries: The highly noisy case," SIAM J. Discrete Math., vol. 13, no. 4, pp. 535-570, 2000.
  • 12
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Apr
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
    • (1984) J. Comput. Syst. Sci , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 13
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • Sep
    • V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes," IEEE Trans. Inf. Theory, vol. 45, no. 6, pp. 1757-1767, Sep. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 14
    • 0345253860 scopus 로고    scopus 로고
    • Construction of a pseudo-random generator from any one-way function
    • J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, "Construction of a pseudo-random generator from any one-way function," SIAM J. Comput. vol. 28, no. 4, pp. 1364-1396, 1999.
    • (1999) SIAM J. Comput , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 15
    • 2642543148 scopus 로고    scopus 로고
    • Polynomial reconstruction based cryptography,
    • Ph.D. dissertation, Comput. Sci. Dept, City Univ. New York, New York
    • A. Kiayias, "Polynomial reconstruction based cryptography," Ph.D. dissertation, Comput. Sci. Dept., City Univ. New York, New York, 2002.
    • (2002)
    • Kiayias, A.1
  • 16
    • 84869164138 scopus 로고    scopus 로고
    • Cryptographic hardness based on the de-coding of Reed Solomon codes
    • P. Widmayer, F. T. Ruiz, R. M. Bueno, M. Hennessy, S. Eidenbenz, and R. Conejo, Eds. Berlin, Germany: Springer-Verlag
    • A. Kiayias and M. Yung, "Cryptographic hardness based on the de-coding of Reed Solomon codes," in Lecture Notes in Computer Science, ser. 2380, P. Widmayer, F. T. Ruiz, R. M. Bueno, M. Hennessy, S. Eidenbenz, and R. Conejo, Eds. Berlin, Germany: Springer-Verlag, 2002, pp. 232-243.
    • (2002) Lecture Notes in Computer Science , vol.2380 , pp. 232-243
    • Kiayias, A.1    Yung, M.2
  • 17
    • 2642529529 scopus 로고    scopus 로고
    • Directions in polynomial reconstruction based cryptography
    • May
    • A. Kiayias and M. Yung, "Directions in polynomial reconstruction based cryptography," IEICE Trans., vol. E87-A, no. 5, pp. 978-985, May 2004.
    • (2004) IEICE Trans , vol.E87-A , Issue.5 , pp. 978-985
    • Kiayias, A.1    Yung, M.2
  • 18
    • 29644436249 scopus 로고    scopus 로고
    • Characterization of security notions for probabilistic private-key encryption
    • J. Katz and M. Yung, "Characterization of security notions for probabilistic private-key encryption," J. Cryptology, vol. 19, no. 1, pp. 67-95, 2006.
    • (2006) J. Cryptology , vol.19 , Issue.1 , pp. 67-95
    • Katz, J.1    Yung, M.2
  • 21
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor, "Bit commitment using pseudorandomness," J. Cryptology, vol. 4, no. 2, pp. 151-158, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 22
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • Atlanta, GA, May 1-4
    • M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. T31st Annu. ACM Symp. Theory Comput., Atlanta, GA, May 1-4, 1999, pp. 245-254.
    • (1999) Proc. T31st Annu. ACM Symp. Theory Comput , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 23
    • 33750199090 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation
    • M. Naor and B. Pinkas, "Oblivious polynomial evaluation," SIAM J. Comput., vol. 35, no. 5, pp. 1254-1281, 2006.
    • (2006) SIAM J. Comput , vol.35 , Issue.5 , pp. 1254-1281
    • Naor, M.1    Pinkas, B.2
  • 24
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Miami Beach, FL, Oct. 19-22
    • M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," in Proc. 38th Annu. Symp. Found. Comput. Sci., Miami Beach, FL, Oct. 19-22, 1997, pp. 458-467.
    • (1997) Proc. 38th Annu. Symp. Found. Comput. Sci , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 25
    • 33646831750 scopus 로고    scopus 로고
    • Correcting errors beyond the Guruswami-Sudan radius
    • Pittsburgh, PA, Oct. 23-25
    • F. Parvaresh and A. Vardy, "Correcting errors beyond the Guruswami-Sudan radius," in Proc. 46th Annu. IEEE Symp. Found. Comput. Sci., Pittsburgh, PA, Oct. 23-25, 2005, vol. 2005, pp. 285-294.
    • (2005) Proc. 46th Annu. IEEE Symp. Found. Comput. Sci , vol.2005 , pp. 285-294
    • Parvaresh, F.1    Vardy, A.2
  • 26
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. Reed and G. Solomon, "Polynomial codes over certain finite fields," SIAM J. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
    • (1960) SIAM J. Appl. Math , vol.8 , Issue.2 , pp. 300-304
    • Reed, I.1    Solomon, G.2
  • 28
    • 0031097176 scopus 로고    scopus 로고
    • Decoding of Reed Solomon codes beyond the error-correction bound
    • M. Sudan, "Decoding of Reed Solomon codes beyond the error-correction bound," J. Complexity, vol. 13, no. 1, pp. 180-193, 1997.
    • (1997) J. Complexity , vol.13 , Issue.1 , pp. 180-193
    • Sudan, M.1
  • 29
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • Chicago, IL, Nov. 3-5
    • A. C. Yao, "Theory and applications of trapdoor functions," in Proc. 23rd Annu. Symp. Found. Comput. Sci., Chicago, IL, Nov. 3-5, 1982, pp. 80-91.
    • (1982) Proc. 23rd Annu. Symp. Found. Comput. Sci , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.