On the Cryptographic Applications of Random Functions (Extended Abstract)

From MaRDI portal
Revision as of 20:20, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2974488

DOI10.1007/3-540-39568-7_22zbMath1359.94599DBLPconf/crypto/GoldreichGM84OpenAlexW2125218823WikidataQ57407783 ScholiaQ57407783MaRDI QIDQ2974488

Oded Goldreich, Silvio Micali

Publication date: 10 April 2017

Published in: Advances in Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-39568-7_22




Related Items (39)

On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \)Witness Maps and ApplicationsExploring crypto dark matter: new simple PRF candidates and their applicationsQuantum algorithms for the \(k\)-XOR problemMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsPerformance improvement for the GGM-construction of pseudorandom functionsBatch-OT with optimal rateAuthentication in the bounded storage modelBalancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsKey regression from constrained pseudorandom functionsOn-line ciphers and the Hash-CBC constructionsError-Correcting Codes Against Chosen-Codeword AttacksSecure two-party input-size reduction: challenges, solutions and applicationsHardness-preserving reductions via cuckoo hashingOne-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributionsThe power of undirected rewindings for adaptive securityThe cost of adaptivity in security games on graphsSimple and more efficient PRFs with tight security from LWE and matrix-DDHUnnamed ItemBounds on the efficiency of black-box commitment schemesInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Capturing one-way functions via NP-hardness of meta-complexityNP-hardness of approximating meta-complexity: a cryptographic approachSuccinct computational secret sharingInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Attribute-based key-insulated signature and its applicationsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyTighter security proofs for GPV-IBE in the quantum random oracle modelReducing complexity assumptions for statistically-hiding commitmentAdaptively Secure Garbled Circuits from One-Way FunctionsSynthesizers and their application to the parallel construction of pseudo-random functionsFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsUnnamed ItemUnnamed ItemFrom non-adaptive to adaptive pseudorandom functionsPseudorandom Functions: Three Decades Later







This page was built for publication: On the Cryptographic Applications of Random Functions (Extended Abstract)