Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Bounds on the Efficiency of Generic Cryptographic Constructions - MaRDI portal

Bounds on the Efficiency of Generic Cryptographic Constructions

From MaRDI portal
Publication:5700578

DOI10.1137/S0097539704443276zbMath1087.94019MaRDI QIDQ5700578

Yael Gertner, Rosario Gennaro, Luca Trevisan, Jonathan N. Katz

Publication date: 28 October 2005

Published in: SIAM Journal on Computing (Search for Journal in Brave)




Related Items

Limits on the usefulness of random oraclesLimits on the Power of Indistinguishability Obfuscation and Functional Encryption(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and BeyondRandom oracles and non-uniformityThe function-inversion problem: barriers and opportunitiesOn the complexity of collision resistant hash functions: new and old black-box separationsMerkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oraclesOn constructing one-way permutations from indistinguishability obfuscationAsymptotically efficient lattice-based digital signaturesNon-adaptive universal one-way hash functions from arbitrary one-way functionsMulti-input Functional Encryption with Unbounded-Message SecurityImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsLower bounds for (batch) PIR with private preprocessingLower bound on SNARGs in the random oracle modelSimple constructions from (almost) regular one-way functionsThe cost of adaptivity in security games on graphsOn the impossibility of purely algebraic signaturesAdaptive zero-knowledge proofs and adaptively secure oblivious transferStructure Versus Hardness Through the Obfuscation LensBounds on the efficiency of black-box commitment schemesAsymptotically Efficient Lattice-Based Digital SignaturesA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn Constructing One-Way Permutations from Indistinguishability ObfuscationOn the complexity of constructing pseudorandom functions (especially when they don't exist)On the Security Loss in Cryptographic ReductionsUnnamed ItemEfficiency Bounds for Adversary Constructions in Black-Box ReductionsOn the impossibility of highly-efficient blockcipher-based hash functionsTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsTime-space tradeoffs and short collisions in Merkle-Damgård hash functionsFixing Cracks in the Concrete: Random Oracles with Auxiliary Input, RevisitedOn subset-resilient hash function families