Non-Black-Box Techniques In Crytpography Thesis for the Ph.D degree
نویسنده
چکیده
f(x) def = x + 1 for any integer x. Given a program Π and a value x, it is possible to compute f(x), where f(·) is the function associated with the program Π, by executing the program Π on a computer. We sometimes call the string Π the representation or code of the function f(·). Since a program is a string, it sometimes makes sense to use it as input to a different program. Indeed, algorithms that take other programs as input are very common in Computer Science. In most cases, these algorithms use their input program as a subroutine. By this we mean that, on input a program Π, the algorithm’s operation does not depend on the particular representation of the program Π, but rather, the algorithm only uses its input program Π to evaluate the function that the program Π computes. That is, the algorithm only uses Π to obtain a “black box” for computing f(·), such that the algorithm can feed inputs to and receive outputs from this box. We call such an algorithm (that only uses black-box access to the program it gets as input) a black-box algorithm. As mentioned above, black-box algorithms are very popular in computer science. Many times, when trying to solve a particular task, one would write an algorithm that solves the task if it is given black-box access to programs that solve some simpler tasks, and then write programs that solve these simpler tasks. This approach is a basic paradigm of software engineering, and almost all programming languages implement mechanisms (such as function calls) to facilitate it. Black-box algorithms are also very popular in the more theoretical aspects of Computer Science. For example, when proving that a decision problem L is NP-complete, one needs to show the existence of a black-box algorithm B (where B is usually called a reduction), such that if B is given black-box access to an algorithm A that solves the problem L, then B can solve the Satisfiability problem. Such reductions also appear in cryptography. For example, consider the constructions of public key encryption schemes whose security can be reduced to the factoring problem [Rab79, BG84]. This is shown by providing a black-box algorithm B, such that if B is given black-box access to an algorithm A that compromises the security of the encryption scheme, then B can solve the factoring problem.
منابع مشابه
Non-black-box Techniques in Cryptography
The American Heritage dictionary defines the term “Black-Box” as “A device or theoretical construct with known or specified performance characteristics but unknown or unspecified constituents and means of operation.” In the context of Computer Science, to use a program as a black-box means to use only its input/output relation by executing the program on chosen inputs, without examining the act...
متن کاملPMU-Based Matching Pursuit Method for Black-Box Modeling of Synchronous Generator
This paper presents the application of the matching pursuit method to model synchronous generator. This method is useful for online analysis. In the proposed method, the field voltage is considered as input signal, while the terminal voltage and active power of the generator are output signals. Usually, the difference equation with a second degree polynomial structure is used to estimate the co...
متن کاملOn Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak’s technique has given rise to various powerful applications and it is a key component in all known protocols with non-black-box simulation. We present the first non-black-box simulation technique that does not r...
متن کاملAlgorithms Based on LP Relaxations for Combinatorial Optimization Problems
We survey the main results presented in the author's Ph.D Thesis 12], which addresses the use of Linear Programming (LP) relaxations within exact and heuristic algorithms for the solution of some Combinatorial Optimization (CO) problems arising from real-life applications. It is well known that CO problems admit several possible Integer LP (ILP) formulations, and the corresponding LP relaxation...
متن کاملTopics in quantum algorithms - Adiabatic Algorithm , Quantum Money , and Bomb Query Complexity
by Han-Hsuan Lin Submitted to the Department of Physics on May 22, 2015, in partial fulfillment of the requirements for the degree of Ph.D. in Physics In this thesis, I present three results on quantum algorithms and their complexity. The first one is a numerical study on the quantum adiabatic algorithm( QAA) . We tested the performance of the QAA on random instances of MAX 2-SAT on 20 qubits a...
متن کامل