메뉴 건너뛰기




Volumn 5978 LNCS, Issue , 2010, Pages 382-400

Public-key cryptographic primitives provably as secure as subset sum

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; ENCRYPTION SCHEMES; OBLIVIOUS TRANSFER PROTOCOLS; POLYNOMIAL-TIME; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION SCHEME; RANDOM INSTANCE; SUBSET SUM; SUBSET SUM PROBLEMS;

EID: 77949610972     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11799-2_23     Document Type: Conference Paper
Times cited : (65)

References (35)
  • 1
    • 70350342511 scopus 로고    scopus 로고
    • Fast cryptographic primitives and circular-secure encryption based on hard learning problems
    • ACPS09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • [ACPS09] Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 3
    • 70350627587 scopus 로고    scopus 로고
    • [AGV09] Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 474-495. Springer, Heidelberg (2009)
    • [AGV09] Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
  • 4
    • 70349358874 scopus 로고    scopus 로고
    • [Ale03] Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS (2003)
    • [Ale03] Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS (2003)
  • 5
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Cré87, Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • [Cré87] Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • DORS08
    • [DORS08] Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Computing 38(1) (2008)
    • (2008) SIAM J. Computing , vol.38 , Issue.1
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 77949577551 scopus 로고    scopus 로고
    • [EGL82] Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO (1982)
    • [EGL82] Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO (1982)
  • 9
    • 24144500621 scopus 로고    scopus 로고
    • Solving medium-density subset sum problems in expected polynomial time
    • FP05, Diekert, V, Durand, B, eds, STACS 2005, Springer, Heidelberg
    • [FP05] Flaxman, A., Przydatek, B.: Solving medium-density subset sum problems in expected polynomial time. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol. 3404, pp. 305-314. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3404 , pp. 305-314
    • Flaxman, A.1    Przydatek, B.2
  • 10
    • 0008203229 scopus 로고
    • On the Lagarias-Odlyzko algorithm for the subset sum problem
    • Fri86
    • [Fri86] Frieze, A.: On the Lagarias-Odlyzko algorithm for the subset sum problem. SIAM Journal on Computing 15 (1986)
    • (1986) SIAM Journal on Computing , vol.15
    • Frieze, A.1
  • 11
    • 0034497243 scopus 로고    scopus 로고
    • [GKM+00] Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS (2000)
    • [GKM+00] Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS (2000)
  • 12
    • 77949603116 scopus 로고    scopus 로고
    • [GMW87] Goldreich,O.,Micali, S.,Wigderson,A.:Howto play a mental game - a completeness theorem for protocols with honest majority. In: STOC (1987)
    • [GMW87] Goldreich,O.,Micali, S.,Wigderson,A.:Howto play a mental game - a completeness theorem for protocols with honest majority. In: STOC (1987)
  • 13
    • 0003691180 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Gol04, Basic Applications, Cambridge University Press, Cambridge 2004
    • [Gol04] Goldreich, O.: Foundations of Cryptography - Volume 2 (Basic Applications). Cambridge University Press, Cambridge (2004)
    • , vol.2
    • Goldreich, O.1
  • 15
    • 40249094510 scopus 로고    scopus 로고
    • [Hai08] Haitner, I.: Semi-honest to malicious oblivious transfer - The black-box way. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 412-426. Springer, Heidelberg (2008)
    • [Hai08] Haitner, I.: Semi-honest to malicious oblivious transfer - The black-box way. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 412-426. Springer, Heidelberg (2008)
  • 16
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • Hoe63
    • [Hoe63] Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301) (1963)
    • (1963) Journal of the American Statistical Association , vol.58 , Issue.301
    • Hoeffding, W.1
  • 17
    • 85077701725 scopus 로고    scopus 로고
    • [HSH+08] Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security (2008)
    • [HSH+08] Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security (2008)
  • 18
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • IN96
    • [IN96] Impagliazzo, R., Naor, M.: Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology 9(4) (1996)
    • (1996) Journal of Cryptology , vol.9 , Issue.4
    • Impagliazzo, R.1    Naor, M.2
  • 20
    • 70350336456 scopus 로고    scopus 로고
    • On bounded distance decoding, unique shortest vectors, and the minimum distance problem
    • LM09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • [LM09] Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 577-594
    • Lyubashevsky, V.1    Micciancio, D.2
  • 23
    • 26944487960 scopus 로고    scopus 로고
    • [Lyu05] Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM2005. LNCS, 3624, pp. 378-389. Springer, Heidelberg (2005)
    • [Lyu05] Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
  • 24
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • MH78
    • [MH78] Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inf. Theory IT-24 (1978)
    • (1978) IEEE Trans. on Inf. Theory , vol.IT-24
    • Merkle, R.C.1    Hellman, M.E.2
  • 25
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • NS09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • [NS09] Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 26
    • 0002114928 scopus 로고
    • The rise and fall of knapsack cryptosystems
    • Odl90
    • [Odl90] Odlyzko, A.: The rise and fall of knapsack cryptosystems. In: Symposia of Applied Mathematics (1990)
    • (1990) Symposia of Applied Mathematics
    • Odlyzko, A.1
  • 28
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • PVW08, Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • [PVW08] Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 30
    • 0003462641 scopus 로고
    • How to exchange secret keys by oblivious transfer
    • Rab81, Technical Report TR-81. Harvard Aiken Computation Laboratory
    • [Rab81] Rabin, M.O.: How to exchange secret keys by oblivious transfer. In: Technical Report TR-81. Harvard Aiken Computation Laboratory (1981)
    • (1981)
    • Rabin, M.O.1
  • 33
    • 44649115943 scopus 로고    scopus 로고
    • [Sha08] Shallue, A.: An improved multi-set algorithm for the dense subset sum problem. In: van der Poorten, A.J., Stein, A. (eds.) ANTS-VIII 2008. LNCS, 5011, pp. 416-429. Springer, Heidelberg (2008)
    • [Sha08] Shallue, A.: An improved multi-set algorithm for the dense subset sum problem. In: van der Poorten, A.J., Stein, A. (eds.) ANTS-VIII 2008. LNCS, vol. 5011, pp. 416-429. Springer, Heidelberg (2008)
  • 34
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Sho97
    • [Sho97] Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5) (1997)
    • (1997) SIAM J. Comput , vol.26 , Issue.5
    • Shor, P.1
  • 35
    • 0022882770 scopus 로고    scopus 로고
    • [Yao86] Yao, A.C.: How to generate and exchange secrets. In: FOCS (1986)
    • [Yao86] Yao, A.C.: How to generate and exchange secrets. In: FOCS (1986)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.