Cryptography in constant parallel time (Q625101)

From MaRDI portal
!
WARNING

This is the item page for this Wikibase entity, intended for internal use and editing purposes.

Please use the normal view instead:

scientific article; zbMATH DE number 5851567
Language Label Description Also known as
default for all languages
No label defined
    English
    Cryptography in constant parallel time
    scientific article; zbMATH DE number 5851567

      Statements

      Cryptography in constant parallel time (English)
      0 references
      0 references
      14 February 2011
      0 references
      Function is locally computable or ``computationally simple'' (can be implemented by a class \(N{C^0}\) circuit), if every bit of the output can be computed by reading a constant number of bits of the input. The author proved in his PhD dissertation in 2007 [Cryptography in constant parallel time, \url{http://www.eng.tau.ac.il/~bennyap/pubs/thesis.pdf}], that under standard intractability assumptions used in cryptography (e.g. that factoring large integers is computationally hard) most cryptographic primitives (one-way functions, pseudorandom generators, symmetric and public key encryption schemes, digital signatures, message authentication schemes, commitment schemes, collision resistant hash functions, zero-knowledge proofs) can be implemented as locally computable functions, actually as functions where every output bit depends only on four input bits; he also provided a compiler that transforms an implementation of a cryptographic primitive in a relatively high complexity class into an \(N{C^0}\) implementation. This book is based on the author's dissertation with some additions [\textit{B. Applebaum} et al., Comput. Complexity 15, No. 2, 115--162 (2006; Zbl 1143.94009)] and references to recent results in parallel cryptography. The book requires only minimal knowledge in computational complexity and cryptography and can be used as a textbook for advanced or graduate students, but it is useful also for researchers.
      0 references
      0 references
      cryptography
      0 references
      parallel time-complexity
      0 references
      class \(N{C^0}\) circuit
      0 references
      one-way function
      0 references
      pseudorandom generator
      0 references
      symmetric encryption
      0 references
      public key encryption
      0 references
      digital signature
      0 references
      message authentication scheme
      0 references
      commitment scheme
      0 references
      collision resistant hash function
      0 references
      zero-knowledge proof
      0 references

      Identifiers

      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references