메뉴 건너뛰기




Volumn 6673 LNCS, Issue , 2011, Pages 25-31

Randomly encoding functions: A new cryptographic paradigm(Invited Talk)

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC APPLICATIONS; ENCODING FUNCTIONS; INVITED TALK; OUTPUT DISTRIBUTION; RANDOMIZED MAPPING;

EID: 79956298358     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-20728-0_3     Document Type: Conference Paper
Times cited : (15)

References (24)
  • 1
    • 79957971446 scopus 로고    scopus 로고
    • Key-dependent message security: Generic amplification and completeness
    • Paterson, K. G. ed., LNCS, Springer, Heidelberg
    • Applebaum, B.: Key-dependent message security: Generic amplification and completeness. In: Paterson, K. G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 527-546. Springer, Heidelberg (2011)
    • (2011) EUROCRYPT 2011 , vol.6632 , pp. 527-546
    • Applebaum, B.1
  • 2
    • 70350342511 scopus 로고    scopus 로고
    • Fast cryptographic primitives and circular-secure encryption based on hard learning problems
    • Halevi, S. ed., LNCS, Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 3
    • 33745306666 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • DOI 10.1007/s00037-006-0211-8
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Journal of Computional Complexity 15(2), 115-162 (2006) (Pubitemid 43938398)
    • (2006) Computational Complexity , vol.15 , Issue.2 , pp. 115-162
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 5
    • 79956328633 scopus 로고    scopus 로고
    • Cryptography by cellular automata or how fast can complexity emerge in nature?
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography by cellular automata or how fast can complexity emerge in nature? In: ICS 2010(2010)
    • (2010) ICS 2010
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 6
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P. G. eds., LNCS, Springer, Heidelberg
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P. G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010); draft of full version available at the authors home page
    • (2010) ICALP 2010 , vol.6198 , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 7
    • 77954643565 scopus 로고    scopus 로고
    • Bounded key-dependent message security
    • Gilbert, H. ed., LNCS, Springer, Heidelberg
    • Barak, B., Haitner, I., Hofheinz, D., Ishai, Y.: Bounded key-dependent message security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 423-444. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010 , vol.6110 , pp. 423-444
    • Barak, B.1    Haitner, I.2    Hofheinz, D.3    Ishai, Y.4
  • 8
    • 77954739043 scopus 로고
    • The round complexity of secure protocols (extended abstract)
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC 1990(1990)
    • (1990) STOC 1990
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 9
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: STOC 1988(1988)
    • (1988) STOC 1988
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 10
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Nyberg, K., Heys, H. M. eds., LNCS, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H. M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
    • (2003) SAC 2002 , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 11
    • 51849118137 scopus 로고    scopus 로고
    • Circular-secure encryption from decision diffie-hellman
    • Wagner, D. ed., LNCS, Springer, Heidelberg
    • Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 12
    • 77957010426 scopus 로고    scopus 로고
    • Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)
    • Rabin, T. ed., LNCS, Springer, Heidelberg
    • Brakerski, Z., Goldwasser, S.: Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back). In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 1-20. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010 , vol.6223 , pp. 1-20
    • Brakerski, Z.1    Goldwasser, S.2
  • 13
    • 79953214912 scopus 로고    scopus 로고
    • Black-Box Circular-secure encryption beyond affine functions
    • Ishai, Y. ed., LNCS, Springer, Heidelberg
    • Brakerski, Z., Goldwasser, S., Kalai, Y.: Black-Box Circular-secure encryption beyond affine functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 201-218. Springer, Heidelberg (2011)
    • (2011) TCC 2011 , vol.6597 , pp. 201-218
    • Brakerski, Z.1    Goldwasser, S.2    Kalai, Y.3
  • 14
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B. ed., LNCS, Springer, Heidelberg
    • Camenisch, J. L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 93. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001 , vol.2045 , pp. 93
    • Camenisch, J.L.1    Lysyanskaya, A.2
  • 15
    • 84957671573 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC 1988(1988)
    • (1988) STOC 1988
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 16
    • 35248883422 scopus 로고    scopus 로고
    • Efficient multi-party computation over rings
    • Biham, E. ed., LNCS, Springer, Heidelberg
    • Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 596-613. Springer, Heidelberg (2003)
    • (2003) EUROCRYPT 2003 , vol.2656 , pp. 596-613
    • Cramer, R.1    Fehr, S.2    Ishai, Y.3    Kushilevitz, E.4
  • 19
    • 79956328170 scopus 로고
    • A minimal model for secure computation (extended abstract)
    • Feige, U., Killian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC 1994(1994)
    • (1994) STOC 1994
    • Feige, U.1    Killian, J.2    Naor, M.3
  • 21
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Ishai, Y., Kushilevitz, E.: Randomizing polynomials: A new representation with applications to round-efficient secure computation. In: FOCS 2000(2000)
    • (2000) FOCS 2000
    • Ishai, Y.1    Kushilevitz, E.2
  • 22
    • 84869164571 scopus 로고    scopus 로고
    • Perfect constant-round secure computation via perfect randomizing polynomials
    • Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. eds., LNCS, Springer, Heidelberg
    • Ishai, Y., Kushilevitz, E.: Perfect constant-round secure computation via perfect randomizing polynomials. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol. 2380, p. 244. Springer, Heidelberg (2002)
    • (2002) ICALP 2002 , vol.2380 , pp. 244
    • Ishai, Y.1    Kushilevitz, E.2
  • 23
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC 1988(1988)
    • (1988) STOC 1988
    • Kilian, J.1
  • 24
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • Yao, A. C. C.: Theory and application of trapdoor functions. In: FOCS 1982(1982)
    • (1982) FOCS 1982
    • Yao, A.C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.