Cryptography in constant parallel time (Q625101)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Cryptography in constant parallel time |
scientific article |
Statements
Cryptography in constant parallel time (English)
0 references
14 February 2011
0 references
Function is locally computable or ``computationally simple'' (can be implemented by a class \(N{C^0}\) circuit), if every bit of the output can be computed by reading a constant number of bits of the input. The author proved in his PhD dissertation in 2007 [Cryptography in constant parallel time, \url{http://www.eng.tau.ac.il/~bennyap/pubs/thesis.pdf}], that under standard intractability assumptions used in cryptography (e.g. that factoring large integers is computationally hard) most cryptographic primitives (one-way functions, pseudorandom generators, symmetric and public key encryption schemes, digital signatures, message authentication schemes, commitment schemes, collision resistant hash functions, zero-knowledge proofs) can be implemented as locally computable functions, actually as functions where every output bit depends only on four input bits; he also provided a compiler that transforms an implementation of a cryptographic primitive in a relatively high complexity class into an \(N{C^0}\) implementation. This book is based on the author's dissertation with some additions [\textit{B. Applebaum} et al., Comput. Complexity 15, No. 2, 115--162 (2006; Zbl 1143.94009)] and references to recent results in parallel cryptography. The book requires only minimal knowledge in computational complexity and cryptography and can be used as a textbook for advanced or graduate students, but it is useful also for researchers.
0 references
cryptography
0 references
parallel time-complexity
0 references
class \(N{C^0}\) circuit
0 references
one-way function
0 references
pseudorandom generator
0 references
symmetric encryption
0 references
public key encryption
0 references
digital signature
0 references
message authentication scheme
0 references
commitment scheme
0 references
collision resistant hash function
0 references
zero-knowledge proof
0 references