Secrecy without one-way functions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy without one-way functions

We show that some problems in information security can be solved without using one-way functions. The latter are usually regarded as a central concept of cryptography, but the very existence of one-way functions depends on difficult conjectures in complexity theory, most notably on the notorious “P 6= NP” conjecture. This is why cryptographic primitives that do not employ one-way functions are ...

متن کامل

Secure multiparty computation without one-way functions

We describe protocols for secure computation of the sum, product, and some other functions of two or more elements of an arbitrary constructible ring, without using any one-way functions. One of the new inputs that we offer here is that, in contrast with other proposals, we conceal intermediate results of a computation. For example, when we compute the sum of k numbers, only the final result is...

متن کامل

Physical one-way functions.

Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...

متن کامل

Biological One-way Functions

Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...

متن کامل

Physical One - Way Functions

(2002). 26. J. M. Caruthers, D. B. McKay, Curr. Opin. Struct. Biol. 12, 123 (2002). 27. J. P. Abrahams, A. G. Leslie, R. Lutter, J. E. Walker, Nature 370, 621 (1994). 28. L. Holm, C. Sander, Trends. Biochem. Sci. 20, 478 (1995). 29. S. S. Velankar, P. Soultanas, M. S. Dillingham, H. S. Subramanya, D. B. Wigley, Cell 97, 75 (1999). 30. R. M. Story, H. Li, J. N. Abelson, Proc. Natl. Acad. Sci. U....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Groups - Complexity - Cryptology

سال: 2013

ISSN: 1867-1144,1869-6104

DOI: 10.1515/gcc-2013-0002