Publication | Closed Access
Public-key cryptography from different assumptions
140
Citations
61
References
2010
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityCryptographic TechnologyPseudorandom GeneratorCommunication ComplexityComputational ComplexityPublic Key AlgorithmP Versus Np ProblemDiscrete MathematicsCombinatorial OptimizationSparse Linear EquationsData PrivacyCryptosystemComputer ScienceAlgorithmic Information TheoryData SecurityCryptographyGraph TheoryPublic-key CryptographyRandomized Algorithm
This paper attempts to broaden the foundations of public-key cryptography. We construct new public-key encryption schemes based on new hardness-on-average assumptions for natural combinatorial NP-hard optimization problems. We consider the following assumptions: It is infeasible to solve a random set of sparse linear equations mod 2, of which a small fraction is noisy. It is infeasible to distinguish between a random unbalanced bipartite graph, and such a graph in which we "plant" at random in the large side a set S with only |S|/3 neighbors. There is a pseudorandom generator in NCz where every output depends on a random constant-size subset of the inputs.
| Year | Citations | |
|---|---|---|
Page 1
Page 1