Derandomization in Cryptography
From MaRDI portal
Publication:5386205
DOI10.1137/050641958zbMath1141.94008OpenAlexW1964334488MaRDI QIDQ5386205
Boaz Barak, Shien Jin Ong, Salil P. Vadhan
Publication date: 22 April 2008
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: http://nrs.harvard.edu/urn-3:HUL.InstRepos:41467486
interactive proofspseudorandom generatorscomplexity theorycommitment schemeswitness-indistinguishable proofs
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Theory of computing (68Q99)
Related Items (21)
Non-malleable codes for bounded parallel-time tampering ⋮ One-message zero knowledge and non-malleable commitments ⋮ Incompressible functions, relative-error extractors, and the power of nondeterministic reductions ⋮ The Journey from NP to TFNP Hardness ⋮ A note on perfect correctness by derandomization ⋮ COA-secure obfuscation and applications ⋮ Verifiable Functional Encryption ⋮ On non-uniform security for black-box non-interactive CCA commitments ⋮ Statistically sender-private OT from LPN and derandomization ⋮ Which languages have 4-round zero-knowledge proofs? ⋮ More efficient verifiable functional encryption ⋮ Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier? ⋮ Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier? ⋮ The communication complexity of private simultaneous messages, revisited ⋮ Verifiable random functions from non-interactive witness-indistinguishable proofs ⋮ Cryptography in the multi-string model ⋮ Black-box non-interactive non-malleable commitments ⋮ Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments ⋮ New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust ⋮ A Note on Perfect Correctness by Derandomization ⋮ Weak Zero-Knowledge beyond the Black-Box Barrier
This page was built for publication: Derandomization in Cryptography