Theory of Cryptography

From MaRDI portal
Publication:5901762

DOI10.1007/b95566zbMath1197.94202OpenAlexW2498336418MaRDI QIDQ5901762

Salil P. Vadhan, Luca Trevisan, Omer Reingold

Publication date: 14 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95566




Related Items (74)

Memory-Tight Reductions for Practical Key Encapsulation MechanismsOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessComputational hardness of optimal fair computation: beyond MinicryptOn the round complexity of black-box secure MPCLimits on the usefulness of random oraclesEnhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsTowards a unified approach to black-box constructions of zero-knowledge proofsTightness subtleties for multi-user PKE notionsOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsOn building fine-grained one-way functions from strong average-case hardnessOn the complexity of collision resistant hash functions: new and old black-box separationsMerkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oraclesOn constructing one-way permutations from indistinguishability obfuscationA lower bound on the length of signatures based on group actions and generic isogeniesMulti-instance secure public-key encryptionDoes Secure Time-Stamping Imply Collision-Free Hash Functions?On the impossibility of key agreements from quantum random oraclesThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsIs it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle?On tight security proofs for Schnorr signaturesRound-optimal black-box secure computation from two-round malicious OTBlack-box separations for non-interactive classical commitments in a quantum worldLifting standard model reductions to common setup assumptionsReproducible circularly secure bit encryption: applications and realizationsRound-optimal black-box MPC in the plain modelA note on non-interactive zero-knowledge from CDHFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessCircular security is complete for KDM securityOn derandomizing Yao's weak-to-strong OWF constructionThe cost of adaptivity in security games on graphsUnnamed ItemPossibility and impossibility results for selective decommitmentsBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesAdaptive zero-knowledge proofs and adaptively secure oblivious transferStructure Versus Hardness Through the Obfuscation LensNon-adaptive programmability of random oracleLimits on the Computational Power of Random StringsA black-box construction of non-malleable encryption from semantically secure encryptionOn Removing Graded Encodings from Functional EncryptionMagic Adversaries Versus Individual Reduction: Science Wins Either WayBounds on the efficiency of black-box commitment schemesComposition Implies Adaptive Security in MinicryptCompression from Collisions, or Why CRHF Combiners Have a Long OutputInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Basing Weak Public-Key Cryptography on Strong One-Way FunctionsSemi-honest to Malicious Oblivious Transfer—The Black-Box WayA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn the Impossibility of Virtual Black-Box Obfuscation in Idealized ModelsLower Bounds on Assumptions Behind Indistinguishability ObfuscationHomomorphic Evaluation Requires DepthOn Constructing One-Way Permutations from Indistinguishability ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?On the complexity of constructing pseudorandom functions (especially when they don't exist)CCA security and trapdoor functions via key-dependent-message securityPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningLower bounds on the query complexity of non-uniform and adaptive reductions showing hardness amplificationPrivate multiparty sampling and approximation of vector combinationsMinicrypt primitives with algebraic structure and applicationsLower Bounds on the Query Complexity of Non-uniform and Adaptive Reductions Showing Hardness AmplificationWhich languages have 4-round fully black-box zero-knowledge arguments from one-way functions?Efficiency Bounds for Adversary Constructions in Black-Box ReductionsOn the Theoretical Gap between Group Signatures with and without UnlinkabilityWeak Oblivious Transfer from Strong One-Way FunctionsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesOn the Necessary and Sufficient Assumptions for UC ComputationTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsBlack-box use of one-way functions is useless for optimal fair coin-tossingToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsOn the memory-tightness of hashed ElGamal




This page was built for publication: Theory of Cryptography