Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle

From MaRDI portal
Revision as of 22:01, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3183575

DOI10.1007/978-3-642-03356-8_22zbMath1252.94046OpenAlexW2100993438MaRDI QIDQ3183575

Mohammad Mahmoody-Ghidary, Boaz Barak

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_22





Related Items (34)

One-way functions imply secure computation in a quantum worldComputational hardness of optimal fair computation: beyond MinicryptLimits on the usefulness of random oraclesLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionOn building fine-grained one-way functions from strong average-case hardnessOn the complexity of collision resistant hash functions: new and old black-box separationsMerkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oraclesOn constructing one-way permutations from indistinguishability obfuscationOn the impossibility of key agreements from quantum random oraclesFine-grained non-interactive key-exchange: constructions and lower boundsBlack-box separations for non-interactive classical commitments in a quantum worldLower bound on SNARGs in the random oracle modelLow communication complexity protocols, collision resistant hash functions and secret key-agreement protocolsOn actively-secure elementary MPC reductionsDistributed Merkle's puzzlesComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsStructure Versus Hardness Through the Obfuscation LensLower Bounds on Assumptions Behind Indistinguishability ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?On the (im)plausibility of public-key quantum money from collision-resistant hash functionsCommunication lower bounds of key-agreement protocols via density increment argumentsFine-grained non-interactive key exchange, revisitedOn sequential functions and fine-grained cryptographyHow (not) to build quantum PKE in MinicryptOn building fine-grained one-way functions from strong average-case hardnessWeak Oblivious Transfer from Strong One-Way FunctionsOn the Communication Complexity of Key-Agreement Protocols.Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessKey establishment à la Merkle in a quantum worldBlack-box use of one-way functions is useless for optimal fair coin-tossingUnnamed ItemThe Complexity of Public-Key Cryptography







This page was built for publication: Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle