Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle

From MaRDI portal
Publication:3183575

DOI10.1007/978-3-642-03356-8_22zbMath1252.94046OpenAlexW2100993438MaRDI QIDQ3183575

Mohammad Mahmoody-Ghidary, Boaz Barak

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_22




Related Items (27)

One-way functions imply secure computation in a quantum worldComputational hardness of optimal fair computation: beyond MinicryptLimits on the usefulness of random oraclesLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionOn building fine-grained one-way functions from strong average-case hardnessOn the complexity of collision resistant hash functions: new and old black-box separationsMerkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oraclesOn constructing one-way permutations from indistinguishability obfuscationOn the impossibility of key agreements from quantum random oraclesFine-grained non-interactive key-exchange: constructions and lower boundsBlack-box separations for non-interactive classical commitments in a quantum worldLower bound on SNARGs in the random oracle modelLow communication complexity protocols, collision resistant hash functions and secret key-agreement protocolsOn actively-secure elementary MPC reductionsDistributed Merkle's puzzlesComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsStructure Versus Hardness Through the Obfuscation LensLower Bounds on Assumptions Behind Indistinguishability ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?Weak Oblivious Transfer from Strong One-Way FunctionsOn the Communication Complexity of Key-Agreement Protocols.Key establishment à la Merkle in a quantum worldBlack-box use of one-way functions is useless for optimal fair coin-tossingUnnamed ItemThe Complexity of Public-Key Cryptography




This page was built for publication: Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle