scientific article; zbMATH DE number 3960854
From MaRDI portal
Publication:3729902
zbMATH Open0596.65002MaRDI QIDQ3729902FDOQ3729902
Authors: Oded Goldreich, Silvio Micali, Shafi Goldwasser
Publication date: 1986
Title of this publication is not available (Why is that?)
Recommendations
computational complexityrandom functionspolynomial-time algorithmrandomnessone-way functionsprediction problemspseudo random number generation
Random number generation in numerical analysis (65C10) Analysis of algorithms and problem complexity (68Q25) Algorithmic information theory (Kolmogorov complexity, etc.) (68Q30)
Cited In (only showing first 100 items - show all)
- Monkey: black-box symmetric ciphers designed for MON\textit{opolizing} KEY\textit{s}
- Leakage resilience from program obfuscation
- On the universal steganography of optimal rate
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Block encryption of quantum messages
- Hidden cosets and applications to unclonable cryptography
- Computing on authenticated data
- From non-adaptive to adaptive pseudorandom functions
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- MoSS: modular security specifications framework
- Watermarking cryptographic functionalities from standard lattice assumptions
- Watermarking cryptographic capabilities
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
- The round complexity of quantum zero-knowledge
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
- Targeted lossy functions and applications
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Efficient noise generation to achieve differential privacy with applications to secure multiparty computation
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Composition Implies Adaptive Security in Minicrypt
- CCA secure \textit{a posteriori} openable encryption in the standard model
- Simpler constructions of asymmetric primitives from obfuscation
- How should we solve search problems privately?
- Bounds on the efficiency of black-box commitment schemes
- On security preserving reductions -- revised terminology
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- On statistically secure obfuscation with approximate correctness
- A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems
- Batch-OT with optimal rate
- Distributed (correlation) samplers: how to remove a trusted dealer in one round
- Lightweight, maliciously secure verifiable function secret sharing
- Incompressible cryptography
- On efficient leakage-resilient pseudorandom functions with hard-to-invert leakages
- Constrained PRFs for unbounded inputs with short keys
- Private information retrieval with sublinear online time
- Constrained pseudorandom functions for unconstrained inputs revisited: achieving verifiability and key delegation
- A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function
- Cryptography with updates
- Limits on the efficiency of (ring) LWE based non-interactive key exchange
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions
- Adaptively secure constrained pseudorandom functions in the standard model
- Incremental cryptography revisited: PRFs, nonces and modular design
- Lower bounds and impossibility results for concurrent self composition
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Pseudorandom functions in NC class from the standard LWE assumption
- Constrained pseudorandom functions from functional encryption
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
- Succinct interactive oracle proofs: applications and limitations
- Black-box use of one-way functions is useless for optimal fair coin-tossing
- On the streaming indistinguishability of a random permutation and a random function
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- On related-secret pseudorandomness
- Matrix PRFs: constructions, attacks, and applications to obfuscation
- On the security of the WOTS-PRF signature scheme
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- The learnability of quantum states
- Computational Security of Quantum Encryption
- A simple construction of iO for Turing machines
- FE and iO for Turing machines from minimal assumptions
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- A study of password security
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- A construction of the simplest super pseudorandom permutation generator
- Key-homomorphic pseudorandom functions from LWE with small modulus
- Output-compressing randomized encodings and applications
- Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
- Limits on the power of indistinguishability obfuscation and functional encryption
- Fast pseudorandom functions based on expander graphs
- Single-key to multi-key functional encryption with polynomial loss
- Constraining pseudorandom functions privately
- From Minicrypt to Obfustopia via private-key functional encryption
- Breaking the sub-exponential barrier in obfustopia
- Private puncturable PRFs from standard lattice assumptions
- Luby-Rackoff Ciphers from Weak Round Functions?
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Revocable hierarchical identity-based encryption with adaptive security
- Cryptography and cryptographic protocols
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- On symmetric encryption with distinguishable decryption failures
- On the correlation intractability of obfuscated pseudorandom functions
- On nonadaptive reductions to the set of random strings and its dense subsets
- Mathematical problems in cryptology
- On the complexity of compressing obfuscation
- Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
- Adaptive hardness and composable security in the plain model from standard assumptions
- Reducing complexity assumptions for statistically-hiding commitment
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Fine-Grained Cryptography
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- A randomness test for block ciphers
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function
- A one-time stegosystem and applications to efficient covert communication
- Hardness-preserving reductions via cuckoo hashing
- A Proof of Security in O(2 n ) for the Benes Scheme
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3729902)