scientific article

From MaRDI portal
Publication:3729902

zbMath0596.65002MaRDI QIDQ3729902

Silvio Micali, Shafi Goldwasser, Oded Goldreich

Publication date: 1986


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Hidden cosets and applications to unclonable cryptographyComputational hardness of optimal fair computation: beyond MinicryptEvolving homomorphic secret sharing for hierarchical access structuresMoSS: modular security specifications frameworkCertifying trapdoor permutations, revisitedA simple construction of iO for Turing machinesFE and iO for Turing machines from minimal assumptionsWatermarking PRFs under standard assumptions: public marking and security with extraction queriesExploring crypto dark matter: new simple PRF candidates and their applicationsPattern matching on encrypted streamsQuantum algorithms for the \(k\)-XOR problemFunctional encryption for Turing machines with dynamic bounded collusion from LWETargeted lossy functions and applicationsPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeA construction of the simplest super pseudorandom permutation generatorLeakage-resilient cryptography from minimal assumptionsEfficient noise generation to achieve differential privacy with applications to secure multiparty computationFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsKernels as features: on kernels, margins, and low-dimensional mappingsIncremental cryptography revisited: PRFs, nonces and modular designSimpler constructions of asymmetric primitives from obfuscationCCA secure \textit{a posteriori} openable encryption in the standard modelOn the security of two identity-based conditional proxy re-encryption schemesAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsPerformance improvement for the GGM-construction of pseudorandom functionsMathematical problems in cryptologyTree-based cryptographic access controlAn unpredictability approach to finite-state randomnessLightweight, maliciously secure verifiable function secret sharingIncompressible cryptographyDistributed (correlation) samplers: how to remove a trusted dealer in one roundBatch-OT with optimal rateA study of password securityRevocable hierarchical identity-based encryption with shorter private keys and update keysFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionMatrix PRFs: constructions, attacks, and applications to obfuscationLong-term security and universal composabilityChecking the correctness of memoriesThe pervasive reach of resource-bounded Kolmogorov complexity in computational complexity theoryMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesNew proofs for NMAC and HMAC: security without collision resistanceEfficient authentication from hard learning problemsKeymill: side-channel resilient key generator, a new concept for SCA-security by designProvably-secure time-bound hierarchical key assignment schemesLeakage-resilient cryptography from puncturable primitives and obfuscationNon-interactive secure computation from one-way functionsSimple and more efficient PRFs with tight security from LWE and matrix-DDHOn learning a union of half spacesOn the impossibility of structure-preserving deterministic primitivesComputational indistinguishability: A sample hierarchyOn the universal steganography of optimal rateOn the security of the WOTS-PRF signature schemeA random number generator based on elliptic curve operationsUniversal forecasting algorithmsAlmost everywhere high nonuniform complexitySecurity proof of the canonical form of self-synchronizing stream ciphersFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsPseudorandom functions in NC class from the standard LWE assumptionThe communication complexity of additionMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsPseudorandom generators hard for \(k\)-DNF resolution and polynomial calculus resolutionA randomness test for block ciphersObfuscation for cryptographic purposesHow should we solve search problems privately?Bounds on the efficiency of black-box commitment schemesBandwidth-efficient attribute-based key-insulated signatures with message recoveryQUAD: A multivariate stream cipher with provable securityConstrained pseudorandom functions from functional encryptionRevocable hierarchical identity-based encryption with adaptive securityAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityCryptography in the multi-string modelLimits on the efficiency of (ring) LWE-based non-interactive key exchangeA proof of security of Yao's protocol for two-party computationSeparating models of learning with faulty teachersPrivate information retrieval with sublinear online timeEfficient simulation of random states and random unitariesHandling expected polynomial-time strategies in simulation-based security proofsPrediction-preserving reducibilityAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsReducing complexity assumptions for statistically-hiding commitmentUpper and lower bounds on black-box steganographyShared generation of pseudo-random functionsCryptography with constant input localitySynthesizers and their application to the parallel construction of pseudo-random functionsProtecting data privacy in private information retrieval schemesAdaptively secure constrained pseudorandom functions in the standard modelBlack-box use of one-way functions is useless for optimal fair coin-tossingEfficient oblivious evaluation protocol and conditional disclosure of secrets for DFAGuaranteeing the diversity of number generatorsCollision-resistant and pseudorandom function based on Merkle-Damgård hash functionBit commitment using pseudorandomnessHardness results for neural network approximation problemsEfficient, perfect polynomial random number generatorsTheory revision with queries: Horn, read-once, and parity formulasDefinitions and properties of zero-knowledge proof systemsOn the streaming indistinguishability of a random permutation and a random functionKey-homomorphic pseudorandom functions from LWE with small modulusPseudorandom correlation functions from variable-density LPN, revisitedSecure two-party input-size reduction: challenges, solutions and applicationsLet attackers program ideal models: modularity and composability for adaptive compromisePrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessProgrammable distributed point functionsPseudorandom (function-Like) quantum state generators: new definitions and applicationsForward-secure encryption with fast forwardingSublinear secure computation from new assumptionsmrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulusCollusion-resistant functional encryption for RAMsNon-Black-Box Worst-Case to Average-Case Reductions Within \(\mathsf{NP}\)When messages are keys: is HMAC a dual-PRF?Noise-free thumbnail-preserving image encryption based on MSB predictionSuccinct interactive oracle proofs: applications and limitationsSoftSpokenOT: quieter OT extension from small-field silent VOLE in the Minicrypt modelQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsCorrelated pseudorandomness from expand-accumulate codesMoz\(\mathbb{Z}_{2^k}\)arella: efficient vector-OLE and zero-knowledge proofs over \(\mathbb{Z}_{2^k}\)\textsf{ISAP+}: \textsf{ISAP} with fast authenticationUniversal reductions: reductions relative to stateful oraclesNo-directional and backward-leak uni-directional updatable encryption are equivalentA framework for statistically sender private OT with optimal rate\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHThe security of the cipher block chaining message authentication codeOn the complexity of compressing obfuscationConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCryptography with UpdatesNatural proofsPseudorandom generators without the XOR lemmaThe truth behind the myth of the folk theoremInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Watermarking cryptographic functionalities from standard lattice assumptionsDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessVerifiable random functions from non-interactive witness-indistinguishable proofsCryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductionsSimple and generic constructions of succinct functional encryptionOn the exact round complexity of secure three-party computationObfustopia built on secret-key functional encryptionSession resumption protocols and efficient forward security for TLS 1.3 0-RTTMinicrypt primitives with algebraic structure and applicationsBoosting in the presence of noiseA New Pseudorandom Generator from Collision-Resistant Hash FunctionsLimits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeCryptography from Learning Parity with NoiseFast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)Limits on the Power of Indistinguishability Obfuscation and Functional EncryptionFast Pseudorandom Functions Based on Expander GraphsThe GGM Function Family Is a Weakly One-Way Family of FunctionsMore efficient DDH pseudorandom generatorsSingle-Key to Multi-Key Functional Encryption with Polynomial LossSparse pseudorandom distributionsPseudorandom sources for BPPGeneralizing PMAC Under Weaker AssumptionsWatermarking Cryptographic CapabilitiesStructural analysis of polynomial-time query learnabilityIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBalancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsEfficient Computations over Encrypted Data BlocksOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesOn Symmetric Encryption with Distinguishable Decryption FailuresA new framework for deniable secure key exchangeCommunication efficient Zero-knowledge Proofs of knowledgePseudo-mixing Time of Random WalksAuthenticated Key Exchange and Key Encapsulation in the Standard ModelBlock encryption of quantum messagesTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionComputational Security of Quantum EncryptionError-Correcting Codes Against Chosen-Codeword AttacksHardness-preserving reductions via cuckoo hashingA Proof of Security in O(2 n ) for the Benes SchemeUnknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRFThe learnability of quantum statesLower bounds and impossibility results for concurrent self compositionThe round complexity of quantum zero-knowledgeSeparating Models of Learning with Faulty TeachersSimulatable verifiable random function from the LWE assumptionUnnamed ItemA one-time stegosystem and applications to efficient covert communicationOne-Round Cross-Domain Group Key Exchange Protocol in the Standard ModelMcCulloch-Pitts Brains and Pseudorandom FunctionsCryptography and cryptographic protocolsChosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsImproved proxy re-encryption schemes with applications to secure distributed storageResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionOn Nonadaptive Reductions to the Set of Random Strings and Its Dense SubsetsOn the Effects of Pirate Evolution on the Design of Digital Content Distribution SystemsMonkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYsOn the Security of the Winternitz One-Time Signature SchemePractical construction and analysis of pseudo-randomness primitivesConstrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationConstraining Pseudorandom Functions PrivatelyFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionPrivate Puncturable PRFs from Standard Lattice AssumptionsQUAD: A Practical Stream Cipher with Provable SecurityComposition Implies Adaptive Security in MinicryptA Provable-Security Treatment of the Key-Wrap ProblemLuby-Rackoff Ciphers from Weak Round Functions?Unclonable Group IdentificationBasing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric CryptographyThe Layered Games Framework for Specifications and Analysis of Security ProtocolsRound-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelIndistinguishability Obfuscation: From Approximate to ExactOutput-Compressing Randomized Encodings and ApplicationsHomomorphic Evaluation Requires DepthOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsPerfect Structure on the Edge of ChaosOn the complexity of constructing pseudorandom functions (especially when they don't exist)An Average Case NP-complete Graph Colouring ProblemShort Redactable Signatures Using Random TreesOn the Security Loss in Cryptographic ReductionsOrder-Preserving Symmetric EncryptionA Leakage-Resilient Mode of OperationA Noiseless Key-Homomorphic PRF: Application on Distributed Storage SystemsCandidate One-Way Functions Based on Expander GraphsThe GGM Construction Does NOT Yield Correlation Intractable Function EnsemblesThree XOR-Lemmas — An ExpositionRandomness and ComputationOn Security Preserving Reductions – Revised TerminologyAnother Motivation for Reducing the Randomness Complexity of AlgorithmsAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsConstrained PRFs for Unbounded Inputs with Short KeysBuilding Secure Block Ciphers on Generic Attacks AssumptionsOn Statistically Secure Obfuscation with Approximate CorrectnessRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumOn the Existence of Extractable One-Way FunctionsFine-Grained CryptographyXMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security AssumptionsLeakage resilience from program obfuscationCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreOn Related-Secret PseudorandomnessComposition of Zero-Knowledge Proofs with Efficient ProversFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsFrom non-adaptive to adaptive pseudorandom functionsComputing on authenticated dataThe Complexity of Public-Key CryptographyBreaking the Sub-Exponential Barrier in Obfustopia