메뉴 건너뛰기




Volumn , Issue , 2008, Pages 433-442

Cryptography with constant computational overhead

Author keywords

Constant computational overhead; Cryptography; Universal hashing

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; HASH FUNCTIONS; NETWORK SECURITY; POLYNOMIAL APPROXIMATION;

EID: 57049124387     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1374376.1374438     Document Type: Conference Paper
Times cited : (132)

References (47)
  • 1
    • 70349358874 scopus 로고    scopus 로고
    • More on average case vs approximation complexity
    • M. Alekhnovich. More on average case vs approximation complexity. In Proc. 44th FOCS, pages 298-307, 2003.
    • (2003) Proc. 44th FOCS , pp. 298-307
    • Alekhnovich, M.1
  • 2
    • 0026834814 scopus 로고
    • Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs
    • N. Alon, J. Bruck, J. Naor, M. Naor, and R. M. Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on Information Theory 38(2) (1992).
    • (1992) IEEE Transactions on Information Theory , vol.38 , Issue.2
    • Alon, N.1    Bruck, J.2    Naor, J.3    Naor, M.4    Roth, R.M.5
  • 3
    • 34547843026 scopus 로고    scopus 로고
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC̊. SIAM J. Comput., 36(4):845-888, 2006. Earlier version in FOCS 2004.
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC̊. SIAM J. Comput., 36(4):845-888, 2006. Earlier version in FOCS 2004.
  • 4
    • 33745306666 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • Earlier version in CCC
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. Computationally private randomizing polynomials and their applications. Computional Complexity, 15(2): 115-162, 2006. Earlier version in CCC 2005.
    • (2005) Computional Complexity , vol.15 , Issue.2 , pp. 115-162
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 7
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • Y. Aumann and Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In Proc. TCC 2007, pages 137-156.
    • (2007) Proc. TCC , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 8
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • D. Beaver. Precomputing oblivious transfer. In CRYPTO, pages 97-109, 1995.
    • (1995) CRYPTO , pp. 97-109
    • Beaver, D.1
  • 9
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • D. Beaver. Correlated pseudorandomness and the complexity of private computations. In 28th STOC, pages 479-488, 1996.
    • (1996) 28th STOC , pp. 479-488
    • Beaver, D.1
  • 10
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
    • (1988) Proc. of 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 11
    • 0033702346 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • A. Blum, A. Kalai, and H. Wasserman. Noise-tolerant learning, the parity problem, and the statistical query model. In Proc. of 32nd STOC, pages 435-440, 2000.
    • (2000) Proc. of 32nd STOC , pp. 435-440
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 12
    • 0021522644 scopus 로고    scopus 로고
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984. Preliminary version in FOCS 82.
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984. Preliminary version in FOCS 82.
  • 14
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. In J. of Cryptology, 13(1), 2000.
    • (2000) J. of Cryptology , vol.13 , Issue.1
    • Canetti, R.1
  • 16
    • 0036041924 scopus 로고    scopus 로고
    • Randomness conductors and constant-degree lossless expanders
    • M. R. Capalbo, O. Reingold, S. P. Vadhan, and A. Wigderson. Randomness conductors and constant-degree lossless expanders. In Proc. STOC 2002, pages 659-668.
    • (2002) Proc. STOC , pp. 659-668
    • Capalbo, M.R.1    Reingold, O.2    Vadhan, S.P.3    Wigderson, A.4
  • 17
    • 0018456171 scopus 로고
    • Universal Classes of Hash Functions
    • L. Carter and M. N. Wegman. Universal Classes of Hash Functions. J. Comput. Syst. Sci. 18(2): 143-154 (1979).
    • (1979) J. Comput. Syst. Sci , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 18
    • 0022198802 scopus 로고
    • The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) In Proc
    • B. Chor, O. Goldreich, J. Haastad, J. Friedman, S. Rudich, and R. Smolensky. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) In Proc. FOCS 1985, pages 396-407.
    • (1985) FOCS , pp. 396-407
    • Chor, B.1    Goldreich, O.2    Haastad, J.3    Friedman, J.4    Rudich, S.5    Smolensky, R.6
  • 22
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 23
    • 0027986369 scopus 로고
    • A minimal model for secure computation (extended abstract)
    • U. Feige, J. Killian, and M. Naor. A minimal model for secure computation (extended abstract). In Proc. of the 26th STOC, pages 554-563, 1994.
    • (1994) Proc. of the 26th STOC , pp. 554-563
    • Feige, U.1    Killian, J.2    Naor, M.3
  • 24
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT 2004, pages 1-19.
    • EUROCRYPT 2004 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 28
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM 33(4): 792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 29
    • 0020279669 scopus 로고    scopus 로고
    • Why and How to Establish a Private Code on a Public Network
    • S. Goldwasser, S. Micali, and P. Tong. Why and How to Establish a Private Code on a Public Network. In FOCS 1982, pages 134-144.
    • FOCS 1982 , pp. 134-144
    • Goldwasser, S.1    Micali, S.2    Tong, P.3
  • 30
    • 85032868051 scopus 로고    scopus 로고
    • How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design
    • O. Goldreich, S. Micali, and A. Wigderson. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. In CRYPTO 1986, pages 171-185.
    • CRYPTO 1986 , pp. 171-185
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 31
    • 0035189692 scopus 로고    scopus 로고
    • Expander-Based Constructions of Efficiently Decodable Codes
    • V. Guruswami and P. Indyk. Expander-Based Constructions of Efficiently Decodable Codes. In Proc. FOCS 2001, pages 658-667.
    • (2001) Proc. FOCS , pp. 658-667
    • Guruswami, V.1    Indyk, P.2
  • 32
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In Proc. STOC 1989, pages 12-24.
    • (1989) Proc. STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 33
    • 84869164571 scopus 로고    scopus 로고
    • Perfect constant-round secure computation via perfect randomizing polynomials
    • Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Proc. 29th ICALP, pages 244-256, 2002.
    • (2002) Proc. 29th ICALP , pp. 244-256
    • Ishai, Y.1    Kushilevitz, E.2
  • 35
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian. Founding cryptography on oblivious transfer. In 20th STOC, pages 20-31, 1988.
    • (1988) 20th STOC , pp. 20-31
    • Kilian, J.1
  • 36
    • 26944487960 scopus 로고    scopus 로고
    • The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
    • V. Lyubashevsky. The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In Proc. APPROX-RANDOM 2005, pages 378-389.
    • (2005) Proc. APPROX-RANDOM , pp. 378-389
    • Lyubashevsky, V.1
  • 37
    • 0025106672 scopus 로고
    • The Computational Complexity of Universal Hashing
    • Y. Mansour, N. Nisan, and P. Tiwari. The Computational Complexity of Universal Hashing. In Proc. STOC 1990, pages 235-243.
    • (1990) Proc. STOC , pp. 235-243
    • Mansour, Y.1    Nisan, N.2    Tiwari, P.3
  • 39
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput., 22(4):838-856, 1993.
    • (1993) SIAM J. Comput , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 40
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proc. 33rd STOC, pages 590-599, 2001.
    • (2001) Proc. 33rd STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 41
    • 0024867751 scopus 로고    scopus 로고
    • Moni Naor, Moti Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In Proc. STOC 1989, pages 33-43.
    • Moni Naor, Moti Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In Proc. STOC 1989, pages 33-43.
  • 42
    • 57049106530 scopus 로고    scopus 로고
    • M.O. Rabin. How to exchange secrets by oblivious transfer. TR-81, Harvard, 1981.
    • M.O. Rabin. How to exchange secrets by oblivious transfer. TR-81, Harvard, 1981.
  • 44
    • 57049171641 scopus 로고    scopus 로고
    • W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography. Cryplology ePrint report 2007/248.
    • W. D. Smith. 1. AES seems weak. 2. Linear time secure cryptography. Cryplology ePrint report 2007/248.
  • 45
    • 0005717392 scopus 로고
    • Linear-time encodable and decodable error-correcting codes
    • D. A. Spielman. Linear-time encodable and decodable error-correcting codes. STOC 1995: 388-397
    • (1995) STOC , pp. 388-397
    • Spielman, D.A.1
  • 46
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 47
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167, 1986.
    • (1986) Proc. 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.