منابع مشابه
Secrecy without one-way functions
We show that some problems in information security can be solved without using one-way functions. The latter are usually regarded as a central concept of cryptography, but the very existence of one-way functions depends on difficult conjectures in complexity theory, most notably on the notorious “P 6= NP” conjecture. This is why cryptographic primitives that do not employ one-way functions are ...
متن کاملSecure multiparty computation without one-way functions
We describe protocols for secure computation of the sum, product, and some other functions of two or more elements of an arbitrary constructible ring, without using any one-way functions. One of the new inputs that we offer here is that, in contrast with other proposals, we conceal intermediate results of a computation. For example, when we compute the sum of k numbers, only the final result is...
متن کاملPhysical one-way functions.
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...
متن کاملBiological One-way Functions
Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...
متن کاملPhysical One - Way Functions
(2002). 26. J. M. Caruthers, D. B. McKay, Curr. Opin. Struct. Biol. 12, 123 (2002). 27. J. P. Abrahams, A. G. Leslie, R. Lutter, J. E. Walker, Nature 370, 621 (1994). 28. L. Holm, C. Sander, Trends. Biochem. Sci. 20, 478 (1995). 29. S. S. Velankar, P. Soultanas, M. S. Dillingham, H. S. Subramanya, D. B. Wigley, Cell 97, 75 (1999). 30. R. M. Story, H. Li, J. N. Abelson, Proc. Natl. Acad. Sci. U....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Groups - Complexity - Cryptology
سال: 2013
ISSN: 1867-1144,1869-6104
DOI: 10.1515/gcc-2013-0002