메뉴 건너뛰기




Volumn , Issue , 2010, Pages 171-180

Public-key cryptography from different assumptions

Author keywords

3lin; densest subgraph problem; expander graphs; learning juntas; learning parity with noise; nc0; public key cryptography

Indexed keywords

BIPARTITE GRAPHS; CYCLE COUNTING; EXPANDER GRAPHS; LEARNING PARITY WITH NOISE; NEW PARAMETERS; NOISE RATE; NP-HARD; OPTIMIZATION PROBLEMS; PRIVATE-KEY; PSEUDORANDOM GENERATORS; PSEUDORANDOMNESS; PUBLIC KEY SCHEMES; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; RANDOM SET; SEMIDEFINITE PROGRAMS; SQUARE ROOTS; SUBGRAPH PROBLEMS;

EID: 77954751550     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806689.1806715     Document Type: Conference Paper
Times cited : (139)

References (57)
  • 1
    • 57949110964 scopus 로고    scopus 로고
    • Algorithmic barriers from phase transitions
    • D. Achlioptas and A. Coja-Oghlan. Algorithmic barriers from phase transitions. In FOCS, pages 793-802, 2008.
    • (2008) FOCS , pp. 793-802
    • Achlioptas, D.1    Coja-Oghlan, A.2
  • 2
    • 27344461174 scopus 로고    scopus 로고
    • Lattice problems in NP intersect coNP
    • D. Aharonov and O. Regev. Lattice problems in NP intersect coNP. J. ACM, 52:749-765, 2005.
    • (2005) J. ACM , vol.52 , pp. 749-765
    • Aharonov, D.1    Regev, O.2
  • 3
    • 0030679849 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/average-case equivalence
    • M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In STOC, pages 284-293, 1997.
    • (1997) STOC , pp. 284-293
    • Ajtai, M.1    Dwork, C.2
  • 4
    • 0344118879 scopus 로고    scopus 로고
    • More on average case vs approximation complexity
    • M. Alekhnovich. More on average case vs approximation complexity. In FOCS, pages 298-307, 2003.
    • (2003) FOCS , pp. 298-307
    • Alekhnovich, M.1
  • 6
    • 0031119485 scopus 로고    scopus 로고
    • The hardness of approximate optima in lattices, codes, and systems of linear equations
    • S. Arora, L. Babai, J. Stern, and Z. Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. J. Comput. Syst. Sci., 54(2):317-331, 1997.
    • (1997) J. Comput. Syst. Sci. , vol.54 , Issue.2 , pp. 317-331
    • Arora, S.1    Babai, L.2    Stern, J.3    Sweedyk, Z.4
  • 7
    • 84871752900 scopus 로고    scopus 로고
    • Computational complexity and information asymmetry in financial products
    • S. Arora, B. Barak, M. Brunnermeier, and R. Ge. Computational complexity and information asymmetry in financial products. In ICS, 2010.
    • (2010) ICS
    • Arora, S.1    Barak, B.2    Brunnermeier, M.3    Ge, R.4
  • 10
    • 40349087309 scopus 로고    scopus 로고
    • Basing weak public-key cryptography on strong one-way functions
    • E. Biham, Y. J. Goren, and Y. Ishai. Basing weak public-key cryptography on strong one-way functions. In TCC, volume 4948, pages 55-72, 2008.
    • (2008) TCC , vol.4948 , pp. 55-72
    • Biham, E.1    Goren, Y.J.2    Ishai, Y.3
  • 11
    • 84877639283 scopus 로고
    • Cryptographic primitives based on hard learning problems
    • A. Blum, M. Furst, M. Kearns, and R. J. Lipton. Cryptographic primitives based on hard learning problems. In CRYPTO, pages 278-291, 1994.
    • (1994) CRYPTO , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.J.4
  • 12
    • 84974698517 scopus 로고    scopus 로고
    • Relevant examples and relevant features: Thoughts from computational learning theory
    • A. L. Blum. Relevant examples and relevant features: Thoughts from computational learning theory. AAAI Fall Symposium on Relevance, 1994.
    • AAAI Fall Symposium on Relevance, 1994
    • Blum, A.L.1
  • 13
    • 0031334221 scopus 로고    scopus 로고
    • Selection of relevant features and examples in machine learning
    • A. L. Blum and P. Langley. Selection of relevant features and examples in machine learning. Artificial Intelligence, 97(1-2):245-271, 1997.
    • (1997) Artificial Intelligence , vol.97 , Issue.1-2 , pp. 245-271
    • Blum, A.L.1    Langley, P.2
  • 14
    • 70350589609 scopus 로고    scopus 로고
    • On the security of goldreich's one-way function
    • A. Bogdanov and Y. Qiao. On the security of goldreich's one-way function. In APPROX-RANDOM, pages 392-405, 2009.
    • (2009) APPROX-RANDOM , pp. 392-405
    • Bogdanov, A.1    Qiao, Y.2
  • 15
    • 70350367955 scopus 로고    scopus 로고
    • 0 circuits
    • 0 circuits. In CCC, pages 3-8, 2009.
    • (2009) CCC , pp. 3-8
    • Braverman, M.1
  • 16
    • 77954742158 scopus 로고
    • Rudich, and Smolensky. The bit extraction problem or t-resilient functions
    • Chor, Goldreich, Hastad, Freidmann, Rudich, and Smolensky. The bit extraction problem or t-resilient functions. In FOCS, 1985.
    • (1985) FOCS
    • Chor, G.1    Hastad, F.2
  • 17
    • 77954694274 scopus 로고    scopus 로고
    • Goldreich's one-way function candidate and myopic backtracking algorithms
    • J. Cook, O. Etesami, R. Miller, and L. Trevisan. Goldreich's one-way function candidate and myopic backtracking algorithms. In TCC, 2009.
    • (2009) TCC
    • Cook, J.1    Etesami, O.2    Miller, R.3    Trevisan, L.4
  • 20
    • 0141655066 scopus 로고    scopus 로고
    • Approximating cvp to within almost-polynomial factors is np-hard
    • I. Dinur, G. Kindler, R. Raz, and S. Safra. Approximating cvp to within almost-polynomial factors is np-hard. Combinatorica, 23(2):205-243, 2003.
    • (2003) Combinatorica , vol.23 , Issue.2 , pp. 205-243
    • Dinur, I.1    Kindler, G.2    Raz, R.3    Safra, S.4
  • 21
    • 38149139025 scopus 로고    scopus 로고
    • Witnesses for non-satisfiability of dense random 3CNF formulas
    • U. Feige, J. H. Kim, and E. Ofek. Witnesses for non-satisfiability of dense random 3CNF formulas. In FOCS, pages 497-508, 2006.
    • (2006) FOCS , pp. 497-508
    • Feige, U.1    Kim, J.H.2    Ofek, E.3
  • 22
    • 0005259971 scopus 로고    scopus 로고
    • The dense k-subgraph problem
    • U. Feige, D. Peleg, and G. Kortsarz. The dense k-subgraph problem. Algorithmica, 29(3):410-421, 2001.
    • (2001) Algorithmica , vol.29 , Issue.3 , pp. 410-421
    • Feige, U.1    Peleg, D.2    Kortsarz, G.3
  • 23
    • 84893574327 scopus 로고
    • Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming
    • Goemans and Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. J. ACM, 42, 1995.
    • (1995) J. ACM , vol.42
    • Goemans1    Williamson2
  • 24
  • 25
    • 0034205405 scopus 로고    scopus 로고
    • On the limits of nonapproximability of lattice problems
    • O. Goldreich and S. Goldwasser. On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci., 60(3):540-563, 2000.
    • (2000) J. Comput. Syst. Sci. , vol.60 , Issue.3 , pp. 540-563
    • Goldreich, O.1    Goldwasser, S.2
  • 26
    • 0027797493 scopus 로고
    • On the existence of pseudorandom generators
    • O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM J. Comput, 22:1163, 1993.
    • (1993) SIAM J. Comput , vol.22 , pp. 1163
    • Goldreich, O.1    Krawczyk, H.2    Luby, M.3
  • 28
    • 33745169714 scopus 로고    scopus 로고
    • One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
    • T. Holenstein and R. Renner. One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In CRYPTO, pages 478-493, 2005.
    • (2005) CRYPTO , pp. 478-493
    • Holenstein, T.1    Renner, R.2
  • 30
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In STOC, pages 44-61, 1989.
    • (1989) STOC , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 31
    • 57049124387 scopus 로고    scopus 로고
    • Cryptography with constant computational overhead
    • Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Cryptography with constant computational overhead. In STOC, pages 433-442, 2008.
    • (2008) STOC , pp. 433-442
    • Ishai, Y.1    Kushilevitz, E.2    Ostrovsky, R.3    Sahai, A.4
  • 32
    • 0038501444 scopus 로고    scopus 로고
    • Hiding cliques for cryptographic security
    • A. Juels and M. Peinado. Hiding cliques for cryptographic security. Designs, Codes and Cryptography, 20(3):269-280, 2000.
    • (2000) Designs, Codes and Cryptography , vol.20 , Issue.3 , pp. 269-280
    • Juels, A.1    Peinado, M.2
  • 33
    • 0028324717 scopus 로고
    • Cryptographic limitations on learning Boolean formulae and finite automata
    • M. Kearns and L. Valiant. Cryptographic limitations on learning Boolean formulae and finite automata. J. ACM, 41(1):67-95, 1994.
    • (1994) J. ACM , vol.41 , Issue.1 , pp. 67-95
    • Kearns, M.1    Valiant, L.2
  • 34
    • 17744389433 scopus 로고    scopus 로고
    • Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique
    • S. Khot. Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique. In FOCS, pages 136-145, 2004.
    • (2004) FOCS , pp. 136-145
    • Khot, S.1
  • 35
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 37
    • 0141517272 scopus 로고    scopus 로고
    • A comparison of the Sherali-Adams, Lovasz-Schrijver, and Lasserre relaxations for 0-1 programming
    • M. Laurent. A comparison of the Sherali-Adams, Lovasz-Schrijver, and Lasserre relaxations for 0-1 programming. MOR: Mathematics of Operations Research, 28:470-496, 2003.
    • (2003) MOR: Mathematics of Operations Research , vol.28 , pp. 470-496
    • Laurent, M.1
  • 39
    • 0001154274 scopus 로고
    • Cones of matrices and set-functions and 0-1 optimization
    • L. Lovász and A. Schrijver. Cones of matrices and set-functions and 0-1 optimization. SIAM Journal on Optimization, 1(2):166-190, 1991.
    • (1991) SIAM Journal on Optimization , vol.1 , Issue.2 , pp. 166-190
    • Lovász, L.1    Schrijver, A.2
  • 40
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, pages 42-44, 1978.
    • (1978) DSN Progress Report , pp. 42-44
    • McEliece, R.J.1
  • 41
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. Merkle. Secure communications over insecure channels. Commun. ACM, 21(4):294-299, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 42
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • V. S. Miller. Use of elliptic curves in cryptography. In CRYPTO, volume 218, pages 417-426, 1985.
    • (1985) CRYPTO , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 44
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit commitment using pseudorandomness. J. Cryptology, 4(2):151-158, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 45
    • 77954721112 scopus 로고    scopus 로고
    • An experimental evaluation of goldreich's one-way function
    • S. K. Panjwani. An experimental evaluation of goldreich's one-way function. Technical report, IIT, Bombay, 2001.
    • (2001) Technical Report, IIT, Bombay
    • Panjwani, S.K.1
  • 46
    • 84947932132 scopus 로고    scopus 로고
    • Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
    • J. Patarin. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. In EUROCRYPT, pages 33-48, 1996.
    • (1996) Eurocrypt , pp. 33-48
    • Patarin, J.1
  • 47
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem
    • C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem. In STOC, pages 333-342, 2009.
    • (2009) STOC , pp. 333-342
    • Peikert, C.1
  • 48
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • C. Peikert, V. Vaikuntanathan, and B. Waters. A framework for efficient and composable oblivious transfer. In CRYPTO, pages 554-571, 2008.
    • (2008) CRYPTO , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 50
    • 20444451186 scopus 로고    scopus 로고
    • New lattice-based cryptographic constructions
    • O. Regev. New lattice-based cryptographic constructions. J. ACM, 51(6):899-942, 2004.
    • (2004) J. ACM , vol.51 , Issue.6 , pp. 899-942
    • Regev, O.1
  • 51
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In STOC, pages 84-93, 2005.
    • (2005) STOC , pp. 84-93
    • Regev, O.1
  • 52
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.3
  • 53
    • 57949101640 scopus 로고    scopus 로고
    • Linear level Lasserre lower bounds for certain k-csps
    • G. Schoenebeck. Linear level Lasserre lower bounds for certain k-csps. In FOCS, pages 593-602, 2008.
    • (2008) FOCS , pp. 593-602
    • Schoenebeck, G.1
  • 54
    • 0001321687 scopus 로고
    • A hierarchy of relaxation between the continuous and convex hull representations for zero-one programming problems
    • H. D. Sherali and W. P. Adams. A hierarchy of relaxation between the continuous and convex hull representations for zero-one programming problems. SIAM J. Disc. Math., 3:411-430, 1990.
    • (1990) SIAM J. Disc. Math. , vol.3 , pp. 411-430
    • Sherali, H.D.1    Adams, W.P.2
  • 55
    • 51749100454 scopus 로고    scopus 로고
    • The sum of d small-bias generators fools polynomials of degree d
    • E. Viola. The sum of d small-bias generators fools polynomials of degree d. In CCC, pages 124-127, 2008.
    • (2008) CCC , pp. 124-127
    • Viola, E.1
  • 56
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • A. C. C. Yao. Theory and applications of trapdoor functions. In FOCS, pages 80-91, 1982.
    • (1982) FOCS , pp. 80-91
    • Yao, A.C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.