One-Way Functions in Worst-Case Cryptography: Algebraic and Security Properties
نویسندگان
چکیده
We survey recent developments in the study of (worst-case) one-way functions having strong algebraic and security properties. According to [RS93], this line of research was initiated in 1984 by Rivest and Sherman who designed two-party secretkey agreement protocols that use strongly noninvertible, total, associative one-way functions as their key building blocks. If commutativity is added as an ingredient, these protocols can be used by more than two parties, as noted by Rabi and Sherman [RS93] who also developed digital signature protocols that are based on such enhanced one-way functions. Until recently, it was an open question whether one-way functions having the algebraic and security properties that these protocols require could be created from any given one-way function. Recently, Hemaspaandra and Rothe [HR99] resolved this open issue in the affirmative, by showing that one-way functions exist if and only if strong, total, commutative, associative one-way functions exist. We discuss this result, and the work of Rabi, Rivest, and Sherman, and recent work of Homan [Hom99] that makes progress on related issues. Supported in part by grant NSF-INT-9815095/DAAD-315-PPP-gü-ab. Written in part while the second author was visiting Friedrich-Schiller-Universität Jena and while the fourth author was visiting the University of Rochester and the Rochester Institute of Technology.
منابع مشابه
Rijndael Circuit Level Cryptanalysis
The Rijndael cipher was chosen as the Advanced Encryption Standard (AES) in August 1999. Its internal structure exhibits unusual properties such as a clean and simple algebraic description for the S-box. In this research, we construct a scalable family of ciphers which behave very much like the original Rijndael. This approach gives us the opportunity to use computational complexity theory. In ...
متن کاملGeneralized Compact Knapsacks Are Collision Resistant
The generalized knapsack problem is the following: given m random elements a1, . . . , am in a ring R, and a target t ∈ R, find z1, . . . , zm ∈ D such that P aizi = t, where D is some fixed subset of R. In (Micciancio, FOCS 2002) it was proved that for appropriate choices of R and D, solving the generalized compact knapsack problem on the average is as hard as solving certain worst-case proble...
متن کاملA Compact Signature Scheme with Ideal Lattice ( Extended
Since the seminal work of Ajtai [1], lattice-based cryptography has attracted many researchers. As fruitful results, there are one-way and collision-resistant hash functions (e.g., [1, 6]) and public-key cryptosystems, which are secure based on the worst-case hardness of lattice problems. However, the primitives have drawbacks; The size of a public key and that of an index of hash functions is ...
متن کاملQuantum one-way permutation over the finite field of two elements
In quantum cryptography, a one-way permutation is a bounded unitary operator U : H → H on a Hilbert space H that is easy to compute on every input, but hard to invert given the image of a random input. Levin [Probl. Inf. Transm., vol. 39 (1): 92-103 (2003)] has conjectured that the unitary transformation g(a, x) = (a, f(x) + ax), where f is any length-preserving function and a, x ∈ GF2‖x‖ , is ...
متن کاملTowards Non-Black-Box Lower Bounds in Cryptography
We consider average-case strengthenings of the traditional assumption that coNP is not contained in AM. Under these assumptions, we rule out generic and potentially non-black-box constructions of various cryptographic primitives (e.g., one-way permutations, collision-resistant hash-functions, constant-round statistically hiding commitments, and constant-round black-box zero-knowledge proofs for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره cs.CC/9911007 شماره
صفحات -
تاریخ انتشار 1999