Algorithms for Black-Box Fields and their Application to Cryptography

From MaRDI portal
Publication:3452358

DOI10.1007/3-540-68697-5_22zbMath1329.94053OpenAlexW1793111075MaRDI QIDQ3452358

Richard J. Lipton, Dan Boneh

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_22




Related Items (32)

Homomorphic Encryption and Some Black Box AttacksDiffie-Hellman OraclesOn the analysis of cryptographic assumptions in the generic ring modelAdjoint representations of black box groups \(\operatorname{PSL}_2(\mathbb{F}_q)\)Pseudo-free families and cryptographic primitivesBlack-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way PermutationsOn the security of functional encryption in the generic group modelHomomorphic encryption: a mathematical surveyFull quantum equivalence of group action DLog and CDH, and moreComputing primitive idempotents in finite commutative rings and applicationsA note on non-interactive zero-knowledge from CDHPolynomial interpolation and identity testing from high powers over finite fieldsQuantum algorithm design: techniques and applicationsAlgebraic curves and cryptographyOn the statistical properties of Diffie-Hellman distributionsComparing two pairing-based aggregate signature schemesOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsCryptographic Assumptions: A Position PaperPseudo-free families of computational universal algebrasGeneric-group delay functions require hidden-order groupsBreaking RSA Generically Is Equivalent to FactoringOn Constructing Homomorphic Encryption Schemes from Coding TheoryOn the complexity of the discrete logarithm and Diffie-Hellman problemsClassical and quantum function reconstruction via character evaluationSynthesizers and their application to the parallel construction of pseudo-random functionsKnown-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism schemeStructures interpretable in models of bounded arithmeticAn efficient signcryption scheme with forward secrecy based on elliptic curveOn the Equivalence of Generic Group ModelsGeneric groups, collision resistance, and ECDSAGenerically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functionsOn instantiating the algebraic group model from falsifiable assumptions



Cites Work


This page was built for publication: Algorithms for Black-Box Fields and their Application to Cryptography