Cryptography with constant input locality (Q1037233)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Cryptography with constant input locality
scientific article

    Statements

    Cryptography with constant input locality (English)
    0 references
    0 references
    0 references
    0 references
    13 November 2009
    0 references
    The paper continues the study of cryptography in low complexity classes, and deals with the problem: Which cryptographic primitives can be realized by functions (with constant input locality) in which every bit of the input influences only a constant number of bits of the input? This is the inverse problem to one discussed in [SIAM J. Comput. 36, No. 4, 845--888 (2006; Zbl 1126.94014)]. It has been characterized what cryptographic tasks can be performed with constant input locality. Assuming the intractability of some problems from the domain of error correcting codes, the constructions of pseudorandom generators, commitments and semantically secure public key encryption schemes with constant input locality and constant output locality has been obtained. On the other hand, primitives which require some form of nonmalleability (such as signatures, MACs, and nonmaleable encryption schemes [\textit{D. Dolev, C. Dwork} and \textit{M. Naor}, SIAM J. Comput. 30, No. 2, 391--437 (2000; Zbl 0963.68067)]) cannot be realized with constant input locality.
    0 references
    cryptography with low complexity
    0 references
    input locality
    0 references
    NC\(^0\)
    0 references
    hardness of decoding random linear code
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references