Quasi - Cryptography
نویسندگان
چکیده
We propose the study of quasi-cryptographic primitives and protocols. These are relaxed versions of standard cryptographic primitives and protocols where the adversary may be given more resources than some of the honest parties. The purpose of this study is to obtain a better understanding of some of the obstacles in basing cryptography on NP-hardness, as well as the relations between various cryptographic primitives. We make a first step in this direction by investigating the simplest quasi-cryptographic primitive: quasi-one-way functions. Extending an approach proposed by Gutfreund, Shaltiel, and Ta-Shma (CCC 2005), we construct an “infinitely often” version of this primitive, partially answering an open question asked by these authors. On the negative side, we show that constructing a length-doubling quasi-pseudorandom generator from a quasi-one-way function (even a quasi-one-way permutation) is impossible via fully-black-box reductions. This contrasts the standard cryptographic setting where such constructions are possible.
منابع مشابه
Duals of quasi-3 designs are not necessarily quasi-3
In the early 1980s Dan Hughes wrote two papers on semi-symmetric 3-designs, which are closely related to quasi-3 designs. In 1973 Peter Cameron asked whether the dual design of any quasi-3 design must also be quasi-3. In this article we answer that question. We give some general constructions of quasi-3 designs which enable us to give the answer. The answer is no.
متن کاملOn the Algebraic Structure of Quasi-cyclic Codes II: Chain Rings
The ring decomposition technique of part I is extended to the case when the factors in the direct product decomposition are no longer fields but arbitrary chain rings. This includes not only the case of quasi-cyclic codes over rings but also the case of quasi-cyclic codes over fields whose co-index is no longer prime to the characteristic of the field. A new quaternary construction of the Leech...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملA family of ternary quasi-perfect BCH codes
In this paper we present a family of ternary quasi-perfect BCH codes. These codes are of minimum distance 5 and covering radius 3. The first member of this family is the ternary quadratic-residue code of length 13.
متن کاملA quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic Improvements over FFS in small to medium characteristic
The discrete logarithm problem (DLP) was first proposed as a hard problem in cryptography in the seminal article of Diffie and Hellman [DH76]. Since then, together with factorization, it has become one of the two major pillars of public key cryptography. As a consequence, the problem of computing discrete logarithms has attracted a lot of attention. From an exponential algorithm in 1976, the fa...
متن کامل