메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 57-74

Adaptive one-way functions and applications

Author keywords

Cryptographic assumptions; Non malleable commitment; Non malleable zero knowledge

Indexed keywords

CONCRETE PROPERTIES; CRYPTOGRAPHIC ASSUMPTIONS; CRYPTOLOGY; NON-MALLEABLE COMMITMENT; NON-MALLEABLE ZERO-KNOWLEDGE; ONE-WAY FUNCTIONS; OPEN PROBLEMS; RANDOM ORACLES;

EID: 51849154718     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_4     Document Type: Conference Paper
Times cited : (75)

References (33)
  • 1
    • 0036949106 scopus 로고    scopus 로고
    • Constant-round coin-tossing with a man in the middle or realizing the shared random string model
    • Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: FOCS, pp. 345-355 (2002)
    • (2002) FOCS , pp. 345-355
    • Barak, B.1
  • 2
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 3
    • 0031334110 scopus 로고    scopus 로고
    • Does parallel repetition lower the error in computationally sound protocols?
    • Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In: FOCS, pp. 374-383 (1997)
    • (1997) FOCS , pp. 374-383
    • Bellare, M.1    Impagliazzo, R.2    Naor, M.3
  • 4
    • 84949210733 scopus 로고    scopus 로고
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, 2339, pp. 319-338. Springer, Heidelberg (2002)
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 319-338. Springer, Heidelberg (2002)
  • 5
    • 84958775356 scopus 로고    scopus 로고
    • Transitive signatures based on factoring and rsa
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Bellare, M., Neven, G.: Transitive signatures based on factoring and rsa. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 397-414. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 397-414
    • Bellare, M.1    Neven, G.2
  • 6
    • 84937408891 scopus 로고    scopus 로고
    • Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Bellare, M., Palacio, A.: Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 162-177. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 7
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, pp, ACM, New York
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, Fairfax, pp. 62-73. ACM, New York (1993)
    • (1993) First ACM Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 0020248370 scopus 로고
    • How to generate cryptographically strong sequences of pseudo random bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo random bits. In: FOCS, pp. 112-117 (1982)
    • (1982) FOCS , pp. 112-117
    • Blum, M.1    Micali, S.2
  • 10
    • 55749085358 scopus 로고    scopus 로고
    • On the security of oaep
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Boldyreva, A., Fischlin, M.: On the security of oaep. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 210-225. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 210-225
    • Boldyreva, A.1    Fischlin, M.2
  • 11
    • 84947778144 scopus 로고    scopus 로고
    • Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 48-63. Springer, Heidelberg (1998)
    • Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998)
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 13
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 14
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557-594 (2004)
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 15
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 17
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM J. Comput. 30(2), 391-437 (2000)
    • (2000) SIAM J. Comput , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 18
    • 0024984004 scopus 로고
    • Witness indistinguishable and witness hiding protocols
    • Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
    • (1990) STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 20
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • Goldreich, O., Krawczyk, H.: On the composition of zero-knowledge proof systems. SIAM J. Comput. 25(1), 169-192 (1996)
    • (1996) SIAM J. Comput , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 21
    • 0344550529 scopus 로고    scopus 로고
    • On the (in)security of the fiat-shamir paradigm
    • Goldwasser, S., Kalai, Y.T.: On the (in)security of the fiat-shamir paradigm. In: FOCS, p. 102-152 (2003)
    • (2003) FOCS , pp. 102-152
    • Goldwasser, S.1    Kalai, Y.T.2
  • 23
    • 40249107558 scopus 로고    scopus 로고
    • Lin, H., Pass, R., Venkitasubramaniam, M.: Concurrent non-malleable commitments from any one-way function. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 571-588. Springer, Heidelberg (2008)
    • Lin, H., Pass, R., Venkitasubramaniam, M.: Concurrent non-malleable commitments from any one-way function. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 571-588. Springer, Heidelberg (2008)
  • 24
    • 33745521850 scopus 로고    scopus 로고
    • Malkin, T., Moriarty, R., Yakovenko, N.: Generalized environmental security from number theoretic assumptions. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 343-359. Springer, Heidelberg (2006)
    • Malkin, T., Moriarty, R., Yakovenko, N.: Generalized environmental security from number theoretic assumptions. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 343-359. Springer, Heidelberg (2006)
  • 25
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Naor, M.: Bit commitment using pseudorandomness. J. of Cryptology 4 (1991)
    • (1991) J. of Cryptology , vol.4
    • Naor, M.1
  • 27
    • 35248818856 scopus 로고    scopus 로고
    • On cryptographic assumptions and challenges
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 96-109
    • Naor, M.1
  • 28
    • 33748630216 scopus 로고    scopus 로고
    • Concurrent non-malleable commitments
    • Pass, R., Rosen, A.: Concurrent non-malleable commitments. In: FOCS, pp. 563-572 (2005)
    • (2005) FOCS , pp. 563-572
    • Pass, R.1    Rosen, A.2
  • 29
    • 34848838622 scopus 로고    scopus 로고
    • New and improved constructions of non-malleable cryptographic protocols
    • Pass, R., Rosen, A.: New and improved constructions of non-malleable cryptographic protocols. In: STOC, pp. 533-542 (2005)
    • (2005) STOC , pp. 533-542
    • Pass, R.1    Rosen, A.2
  • 30
    • 38049052188 scopus 로고    scopus 로고
    • Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 86-102. Springer, Heidelberg (2007)
    • Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)
  • 31
    • 4544347480 scopus 로고    scopus 로고
    • New notions of security: Achieving universal composability without trusted setup
    • Prabhakaran, M., Sahai, A.: New notions of security: achieving universal composability without trusted setup. In: STOC, pp. 242-251 (2004)
    • (2004) STOC , pp. 242-251
    • Prabhakaran, M.1    Sahai, A.2
  • 33
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS, pp. 543-553 (1999)
    • (1999) FOCS , pp. 543-553
    • Sahai, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.