On one-way functions and polynomial-time isomorphisms
نویسندگان
چکیده
منابع مشابه
One-Time Trapdoor One-Way Functions
Trapdoors are widely used in cryptography, in particular for digital signatures and public key encryption. In these classical applications, it is highly desirable that trapdoors remain secret even after their use. In this paper, we consider positive applications of trapdoors that do not remain secret when they are used. We introduce and formally define one-time trapdoor one-way functions (OTTOW...
متن کاملOn complete one-way functions
Complete constructions play an important role in theoretical computer science. However, in cryptography complete constructions have so far been either absent or purely theoretical. In 2003, L.A. Levin presented the idea of a combinatorial complete one-way function. In this paper, we present two new one-way functions based on semi-Thue string rewriting systems and a version of the Post correspon...
متن کاملOn One-One Polynomial Time Equivalence Relations
Two sets A and B are one-one polynomial time equivalent (one-one p-equivalent) if there are polynomial time one-one reductions from A to B and from B to A. In this paper we show that all EXPTIME complete sets are one-one p-equivalent by length increasing reductions. Moreover we show this result for many complexity classes which can be proved by a straightforward diagonalization to contain P pro...
متن کاملPhysical one-way functions.
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...
متن کاملBiological One-way Functions
Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 1986
ISSN: 0304-3975
DOI: 10.1016/0304-3975(86)90152-0