scientific article; zbMATH DE number 4185033

From MaRDI portal
Publication:5750403

zbMath0718.68042MaRDI QIDQ5750403

Steven Rudich, Russell Impagliazzo

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

One-way functions imply secure computation in a quantum worldHow to build an ideal cipher: the indifferentiability of the Feistel constructionEfficient set intersection with simulation-based securityOne-way permutations and self-witnessing languagesOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessComputational hardness of optimal fair computation: beyond MinicryptOn the round complexity of black-box secure MPCFunctional inversion and communication complexityLimits on the usefulness of random oraclesTwo-round MPC: information-theoretic and black-boxEnhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsCertifying trapdoor permutations, revisitedOn the security loss of unique signaturesImpossibility of simulation secure functional encryption even with random oraclesTowards a unified approach to black-box constructions of zero-knowledge proofsKHAPE: Asymmetric PAKE from key-hiding key exchangeThe Journey from NP to TFNP HardnessLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionPseudoentropy: Lower-Bounds for Chain Rules and TransformationsSecure Multiparty RAM Computation in Constant RoundsTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionSimultaneous strong separations of probabilistic and unambiguous complexity classesUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsDerandomized constructions of \(k\)-wise (almost) independent permutationsIncompressible cryptographyOn building fine-grained one-way functions from strong average-case hardnessOn characterizations of escrow encryption schemesFeasibility and infeasibility of secure computation with malicious PUFsProofs of Work from worst-case assumptionsA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementOn the complexity of collision resistant hash functions: new and old black-box separationsMerkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oraclesMore efficient oblivious transfer extensionsCompleteness for symmetric two-party functionalities: revisitedOn constructing one-way permutations from indistinguishability obfuscationThe Simplest Protocol for Oblivious TransferSecure commitment against a powerful adversaryOn actively-secure elementary MPC reductionsOn derandomizing Yao's weak-to-strong OWF constructionOn the impossibility of purely algebraic signaturesActively Secure 1-out-of-N OT Extension with Application to Private Set IntersectionComplexity limitations on quantum computationBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesAdaptive zero-knowledge proofs and adaptively secure oblivious transferComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsSecure two-party computation in a quantum worldEfficient, actively secure MPC with a dishonest majority: a surveyStructure Versus Hardness Through the Obfuscation LensSecret-Sharing Schemes: A SurveyA black-box construction of non-malleable encryption from semantically secure encryptionDeterministic encryption with the Thorp shuffleRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionMagic Adversaries Versus Individual Reduction: Science Wins Either WayBounds on the efficiency of black-box commitment schemesComposition Implies Adaptive Security in MinicryptCryptographic Functions from Worst-Case Complexity AssumptionsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Basing Weak Public-Key Cryptography on Strong One-Way FunctionsOT-Combiners via Secure ComputationA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn the XOR of Multiple Random PermutationsOn the Impossibility of Virtual Black-Box Obfuscation in Idealized ModelsLower Bounds on Assumptions Behind Indistinguishability ObfuscationHomomorphic Evaluation Requires DepthOn Constructing One-Way Permutations from Indistinguishability ObfuscationKey-dependent message security: generic amplification and completenessPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningOn the Security Loss in Cryptographic ReductionsOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelWhich languages have 4-round fully black-box zero-knowledge arguments from one-way functions?Blazing fast OT for three-round UC OT extensionEfficiency Bounds for Adversary Constructions in Black-Box ReductionsOblivious transfer is in MiniQCryptOn the Theoretical Gap between Group Signatures with and without UnlinkabilityWeak Oblivious Transfer from Strong One-Way FunctionsOn the Communication Complexity of Key-Agreement Protocols.Reducing complexity assumptions for statistically-hiding commitmentNetwork Oblivious TransferOn Statistically Secure Obfuscation with Approximate CorrectnessLinicrypt: A Model for Practical CryptographyFine-Grained CryptographyA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysOn black-box complexity of universally composable security in the CRS modelOn the Necessary and Sufficient Assumptions for UC ComputationTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsCharacterizing the existence of one-way permutationsBlack-Box Constructions for Fully-Simulatable Oblivious Transfer ProtocolsCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsIndifferentiability for public key cryptosystemsThe summation-truncation hybrid: reusing discarded bits for freeBlack-box use of one-way functions is useless for optimal fair coin-tossingEfficient oblivious evaluation protocol and conditional disclosure of secrets for DFANew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustPseudorandom Functions: Three Decades LaterToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsCryptography and algorithmic randomnessOn subset-resilient hash function familiesOn the streaming indistinguishability of a random permutation and a random function




This page was built for publication: