Candidate One-Way Functions Based on Expander Graphs

From MaRDI portal
Publication:3088178

DOI10.1007/978-3-642-22670-0_10zbMath1306.94056OpenAlexW2172366597MaRDI QIDQ3088178

Oded Goldreich

Publication date: 19 August 2011

Published in: Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22670-0_10




Related Items (48)

On the fast algebraic immunity of threshold functionsExpander-based cryptography meets natural proofsCounterexamples to new circular security assumptions underlying iOExploring crypto dark matter: new simple PRF candidates and their applicationsOn the Power of Learning from k-Wise QueriesLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsA dichotomy for local small-bias generatorsFast Pseudorandom Functions Based on Expander GraphsTowards breaking the exponential barrier for general secret sharingCryptographic hardness of random local functions. SurveyA Survey on some Applications of Graph Theory in CryptographyLocal expandersAsymptotically quasi-optimal cryptographyIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Statistical Query Algorithms for Mean Vector Estimation and Stochastic Convex OptimizationLocally computable UOWHF with linear shrinkageImproved filter permutators for efficient FHE: better instances and implementationsLower bound on average-case complexity of inversion of Goldreich's function by drunken backtracking algorithmsNon-adaptive universal one-way hash functions from arbitrary one-way functionsTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherWorst-case subexponential attacks on PRGs of constant degree or constant localityOblivious transfer with constant computational overheadAlgebraic Attacks against Random Local Functions and Their CountermeasuresNon-interactive zero-knowledge from non-interactive batch argumentsMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNOn the security of Goldreich's one-way functionUnnamed ItemUnnamed ItemBoolean Functions for Homomorphic-Friendly Stream CiphersThe Complexity of Inversion of Explicit Goldreich’s Function by DPLL AlgorithmsNew Algorithms for Learning in Presence of ErrorsMinimizing locality of one-way functions via semi-private randomized encodingsPseudorandom generators hard for \(k\)-DNF resolution and polynomial calculus resolutionPerfect Structure on the Edge of ChaosUnnamed ItemA Candidate Counterexample to the Easy Cylinders ConjectureNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationExpander graphs based on GRH with an application to elliptic curve cryptographyExpander-Based Cryptography Meets Natural ProofsOn the One-Way Function Candidate Proposed by GoldreichCryptography with constant input localityThe replica symmetric phase of random constraint satisfaction problemsOn succinct arguments and witness encryption from groupsUnnamed ItemUnnamed ItemThe Complexity of Public-Key Cryptography



Cites Work


This page was built for publication: Candidate One-Way Functions Based on Expander Graphs