메뉴 건너뛰기




Volumn 5677 LNCS, Issue , 2009, Pages 355-373

Computational indistinguishability amplification: Tight product theorems for system composition

Author keywords

[No Author keywords available]

Indexed keywords

BIT-STRINGS; BLOCK CIPHERS; COMPUTATIONAL SETTINGS; CRYPTOGRAPHIC PRIMITIVES; DISTINGUISHERS; GENERAL CLASS; INDISTINGUISHABILITY; INFORMATION THEORETIC BOUNDS; INPUT AND OUTPUTS; INTERACTIVE SYSTEM; KEY TECHNIQUES; OPTIMAL SECURITY; PSEUDO-RANDOM FUNCTIONS; PSEUDORANDOM GENERATORS; PSEUDORANDOM PERMUTATION; SECURITY AMPLIFICATION; SYSTEM COMPOSITION;

EID: 70350348921     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03356-8_21     Document Type: Conference Paper
Times cited : (19)

References (35)
  • 1
    • 0031334110 scopus 로고    scopus 로고
    • Does parallel repetition lower the error in computationally sound protocols?
    • Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In: FOCS 1997, pp. 374-383 (1997)
    • (1997) FOCS 1997 , pp. 374-383
    • Bellare, M.1    Impagliazzo, R.2    Naor, M.3
  • 2
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 24144435673 scopus 로고    scopus 로고
    • Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 17-33. Springer, Heidelberg (2005)
    • Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
  • 4
    • 38049123011 scopus 로고    scopus 로고
    • Amplifying collision resistance: A complexity-theoretic treatment
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Canetti, R., Rivest, R.L., Sudan, M., Trevisan, L., Vadhan, S.P., Wee, H.: Amplifying collision resistance: A complexity-theoretic treatment. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 264-283. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 264-283
    • Canetti, R.1    Rivest, R.L.2    Sudan, M.3    Trevisan, L.4    Vadhan, S.P.5    Wee, H.6
  • 5
    • 33745828152 scopus 로고    scopus 로고
    • Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Damgård, I.B., Nielsen, J.B.: Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 449-464. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 449-464
    • Damgård, I.B.1    Nielsen, J.B.2
  • 6
    • 70350281850 scopus 로고    scopus 로고
    • Security amplification for interactive cryptographic primitives
    • TCC
    • Dodis, Y., Impagliazzo, R., Jaiswal, R., Kabanets, V.: Security amplification for interactive cryptographic primitives. In: TCC 2009. LNCS, vol. 5444, pp. 128-145 (2009)
    • (2009) LNCS , vol.5444 , pp. 128-145
    • Dodis, Y.1    Impagliazzo, R.2    Jaiswal, R.3    Kabanets, V.4
  • 7
    • 35048881610 scopus 로고    scopus 로고
    • Immunizing encryption schemes from decryption errors
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dwork, C., Naor, M., Reingold, O.: Immunizing encryption schemes from decryption errors. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 342-360. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 342-360
    • Dwork, C.1    Naor, M.2    Reingold, O.3
  • 8
    • 0022069123 scopus 로고
    • On the power of cascade ciphers
    • Even, S., Goldreich, O.: On the power of cascade ciphers. ACM Trans. Comput. Syst. 3(2), 108-116 (1985)
    • (1985) ACM Trans. Comput. Syst , vol.3 , Issue.2 , pp. 108-116
    • Even, S.1    Goldreich, O.2
  • 11
    • 33749559476 scopus 로고    scopus 로고
    • On the power of the randomized iterate
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Haitner, I., Harnik, D., Reingold, O.: On the power of the randomized iterate. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 22-40. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 22-40
    • Haitner, I.1    Harnik, D.2    Reingold, O.3
  • 12
    • 40249103085 scopus 로고    scopus 로고
    • Halevi, S., Rabin, T.: Degradation and amplification of computational hardness. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 626-643. Springer, Heidelberg (2008)
    • Halevi, S., Rabin, T.: Degradation and amplification of computational hardness. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 626-643. Springer, Heidelberg (2008)
  • 14
    • 24144475180 scopus 로고    scopus 로고
    • Herzberg, A.: On tolerant cryptographic constructions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 172-190. Springer, Heidelberg (2005)
    • Herzberg, A.: On tolerant cryptographic constructions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 172-190. Springer, Heidelberg (2005)
  • 15
    • 34848917325 scopus 로고    scopus 로고
    • Key agreement from weak bit agreement
    • Holenstein, T.: Key agreement from weak bit agreement. In: STOC 2005, pp. 664-673 (2005)
    • (2005) STOC 2005 , pp. 664-673
    • Holenstein, T.1
  • 16
    • 33745169714 scopus 로고    scopus 로고
    • One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Holenstein, T., Renner, R.: One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 478-493. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 478-493
    • Holenstein, T.1    Renner, R.2
  • 17
    • 38049059190 scopus 로고    scopus 로고
    • Hopper, N., Molnar, D., Wagner, D.: From weak to strong watermarking. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 362-382. Springer, Heidelberg (2007)
    • Hopper, N., Molnar, D., Wagner, D.: From weak to strong watermarking. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 362-382. Springer, Heidelberg (2007)
  • 18
    • 0029516814 scopus 로고
    • Hard-core distributions for somewhat hard problems
    • Impagliazzo, R.: Hard-core distributions for somewhat hard problems. In: FOCS 1995, pp. 538-545 (1995)
    • (1995) FOCS 1995 , pp. 538-545
    • Impagliazzo, R.1
  • 19
    • 38049125094 scopus 로고    scopus 로고
    • Chernoff-type direct product theorems
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Impagliazzo, R., Jaiswal, R., Kabanets, V.: Chernoff-type direct product theorems. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 500-516. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 500-516
    • Impagliazzo, R.1    Jaiswal, R.2    Kabanets, V.3
  • 20
    • 51249173191 scopus 로고
    • One way functions and pseudorandom generators
    • Levin, L.A.: One way functions and pseudorandom generators. Combinatorica 7(4), 357-363 (1987)
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 357-363
    • Levin, L.A.1
  • 21
    • 5844291762 scopus 로고
    • Pseudo-random permutation generators and cryptographic composition
    • Luby, M., Rackoff, C.: Pseudo-random permutation generators and cryptographic composition. In: STOC 1986, pp. 356-363 (1986)
    • (1986) STOC 1986 , pp. 356-363
    • Luby, M.1    Rackoff, C.2
  • 22
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.1
  • 23
    • 0027308007 scopus 로고
    • Cascade ciphers: The importance of being first
    • Maurer, U., Massey, J.L.: Cascade ciphers: The importance of being first. Journal of Cryptology 6(1), 55-61 (1993)
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 55-61
    • Maurer, U.1    Massey, J.L.2
  • 24
    • 38049173959 scopus 로고    scopus 로고
    • Indistinguishability amplification
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Maurer, U., Pietrzak, K., Renner, R.: Indistinguishability amplification. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 130-149. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 130-149
    • Maurer, U.1    Pietrzak, K.2    Renner, R.3
  • 25
    • 38049177352 scopus 로고    scopus 로고
    • A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Maurer, U., Sjödin, J.: A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 498-516. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 498-516
    • Maurer, U.1    Sjödin, J.2
  • 26
    • 70350256331 scopus 로고    scopus 로고
    • Myers, S.: On the development of block-ciphers and pseudo-random function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
    • Myers, S.: On the development of block-ciphers and pseudo-random function generators using the composition and XOR operators. Master's thesis, University of Toronto (1999)
  • 27
    • 23944518373 scopus 로고    scopus 로고
    • Efficient amplification of the security of weak pseudo-random function generators
    • Myers, S.: Efficient amplification of the security of weak pseudo-random function generators. Journal of Cryptology 16, 1-24 (2003)
    • (2003) Journal of Cryptology , vol.16 , pp. 1-24
    • Myers, S.1
  • 28
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. Journal of Computer and System Sciences 58(2), 336-375 (1999)
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.2 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 29
    • 35448969719 scopus 로고    scopus 로고
    • An efficient parallel repetition theorem for Arthur-Merlin games
    • Pass, R., Venkitasubramaniam, M.: An efficient parallel repetition theorem for Arthur-Merlin games. In: STOC 2007, pp. 420-429 (2007)
    • (2007) STOC 2007 , pp. 420-429
    • Pass, R.1    Venkitasubramaniam, M.2
  • 30
    • 38049052188 scopus 로고    scopus 로고
    • Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 86-102. Springer, Heidelberg (2007)
    • Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)
  • 31
    • 51849110592 scopus 로고    scopus 로고
    • Hardness amplification proofs require majority
    • Shaltiel, R., Viola, E.: Hardness amplification proofs require majority. In: STOC 2008, pp. 589-598 (2008)
    • (2008) STOC 2008 , pp. 589-598
    • Shaltiel, R.1    Viola, E.2
  • 32
    • 78649840429 scopus 로고    scopus 로고
    • Provable security for block ciphersby decorrelation
    • Meinel, C, Morvan, M, eds, STACS 1998, Springer, Heidelberg
    • Vaudenay, S.: Provable security for block ciphersby decorrelation. In: Meinel, C., Morvan, M. (eds.) STACS 1998. LNCS, vol. 1373, pp. 249-275. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1373 , pp. 249-275
    • Vaudenay, S.1
  • 33
    • 84944039266 scopus 로고    scopus 로고
    • Vaudenay, S.: Adaptive-attack norm for decorrelation and super-pseudorandomness. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 49-61. Springer, Heidelberg (2000)
    • Vaudenay, S.: Adaptive-attack norm for decorrelation and super-pseudorandomness. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 49-61. Springer, Heidelberg (2000)
  • 34
    • 38049160265 scopus 로고    scopus 로고
    • Oblivious-transfer amplification
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Wullschleger, J.: Oblivious-transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 555-572
    • Wullschleger, J.1
  • 35
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • Yao, A.C.: Theory and applications of trapdoor functions. In: FOCS 1982, pp. 80-91 (1982)
    • (1982) FOCS 1982 , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.