Feebly secure cryptographic primitives

被引:0
|
作者
Hirsch E.A. [1 ]
Melanich O. [1 ]
Nikolenko S.I. [1 ]
机构
[1] St. Petersburg Department of the Steklov Mathematical Institute, St. Petersburg
关键词
Constant Factor; Circuit Complexity; Cryptographic Primitive; Trapdoor Function; Honest Participant;
D O I
10.1007/s10958-012-1103-x
中图分类号
学科分类号
摘要
In 1992, A. Hiltgen provided first construction of provably (slightly) secure cryptographic primitives, namely, feebly one-way functions. These functions are provably harder to invert than to compute, but the complexity (viewed as the circuit complexity over circuits with arbitrary binary gates) is amplified only by a constant factor (in Hiltgen's works, the factor approaches 2). In traditional cryptography, one-way functions are the basic primitive of private-key shemes, while public-key schemes are constructed using trapdoor functions. We continue Hiltgen's work by providing examples of feebly secure trapdoor functions where the adversary is guaranteed to spend more time than honest participants (also by a constant factor). We give both a (simpler) linear and a (better) nonlinear construction. Bibliography: 25 titles. © 2012 Springer Science+Business Media New York.
引用
收藏
页码:17 / 34
页数:17
相关论文
共 50 条
  • [1] The sponge construction as a source of secure cryptographic primitives
    Borowski, Mariusz
    [J]. 2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [2] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols
    Camenisch, Jan
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
  • [3] Secure group instant messaging using cryptographic primitives
    Thukral, A
    Zou, X
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1002 - 1011
  • [4] Cryptographic primitives
    Garrett, P
    [J]. PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [5] Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
    Lyubashevsky, Vadim
    Palacio, Adriana
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 382 - +
  • [6] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    [J]. 26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
  • [7] A Feebly Secure Trapdoor Function
    Hirsch, Edward A.
    Nikolenko, Sergely I.
    [J]. COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2009, 5675 : 129 - 142
  • [8] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    [J]. Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [9] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Abidalrahman Moh’d
    Nauman Aslam
    William Phillips
    William Robertson
    Hosein Marzi
    [J]. Personal and Ubiquitous Computing, 2013, 17 : 1051 - 1059
  • [10] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Moh'd, Abidalrahman
    Aslam, Nauman
    Phillips, William
    Robertson, William
    Marzi, Hosein
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 1051 - 1059