Cryptography in constant parallel time (Q625101)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Cryptography in constant parallel time
scientific article

    Statements

    Cryptography in constant parallel time (English)
    0 references
    0 references
    14 February 2011
    0 references
    Function is locally computable or ``computationally simple'' (can be implemented by a class \(N{C^0}\) circuit), if every bit of the output can be computed by reading a constant number of bits of the input. The author proved in his PhD dissertation in 2007 [Cryptography in constant parallel time, \url{http://www.eng.tau.ac.il/~bennyap/pubs/thesis.pdf}], that under standard intractability assumptions used in cryptography (e.g. that factoring large integers is computationally hard) most cryptographic primitives (one-way functions, pseudorandom generators, symmetric and public key encryption schemes, digital signatures, message authentication schemes, commitment schemes, collision resistant hash functions, zero-knowledge proofs) can be implemented as locally computable functions, actually as functions where every output bit depends only on four input bits; he also provided a compiler that transforms an implementation of a cryptographic primitive in a relatively high complexity class into an \(N{C^0}\) implementation. This book is based on the author's dissertation with some additions [\textit{B. Applebaum} et al., Comput. Complexity 15, No. 2, 115--162 (2006; Zbl 1143.94009)] and references to recent results in parallel cryptography. The book requires only minimal knowledge in computational complexity and cryptography and can be used as a textbook for advanced or graduate students, but it is useful also for researchers.
    0 references
    0 references
    cryptography
    0 references
    parallel time-complexity
    0 references
    class \(N{C^0}\) circuit
    0 references
    one-way function
    0 references
    pseudorandom generator
    0 references
    symmetric encryption
    0 references
    public key encryption
    0 references
    digital signature
    0 references
    message authentication scheme
    0 references
    commitment scheme
    0 references
    collision resistant hash function
    0 references
    zero-knowledge proof
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references