One-way functions and the isomorphism conjecture

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1342 - 2812 One - Way Functions and the Isomorphism Conjecture

We study the Isomorphism Conjecture proposed by Berman and Hartmanis. It states that all sets complete for NP under polynomial-time many-one reductions are P-isomorphic to each other. From previous research it has been widely believed that all NP-complete sets are reducible each other by one-to-one and length-increasing polynomial-time reductions, but we may not hope for the full p-isomorphism ...

متن کامل

The Isomorphism Conjecture Holds andOne - way Functions

In this paper we demonstrate an oracle relative to which there are one-way functions but every paddable 1-li-degree collapses to an isomorphism type, thus yielding a relativized failure of the Joseph-Young Conjecture (JYC) JY85]. We then use this result to construct an oracle relative to which the Isomorphism Conjecture (IC) is true but one-way functions exist, which answers an open question of...

متن کامل

One Way Functions –Conjecture, Status, Applications and Future Research Scope

The conjecture that one way function exists is an open problem, the resolution of which holds the key for the solution of many unsolved problems in mathematics and cryptography. This paper presents the introduction of one way functions from complexity & modern cryptography theory viewpoint and their significance in cryptographic applications and research. This paper presents the features and li...

متن کامل

Physical one-way functions.

Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...

متن کامل

Biological One-way Functions

Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 1994

ISSN: 0304-3975

DOI: 10.1016/0304-3975(94)90031-0