Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings

Bibliographic Details
Main Authors: Dodis, Yevgeniy, Goldwasser, Shafi
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:en_US
Published: Springer Berlin / Heidelberg 2012
Online Access:http://hdl.handle.net/1721.1/73868
https://orcid.org/0000-0003-4728-1535
_version_ 1826205974779658240
author Dodis, Yevgeniy
Goldwasser, Shafi
author2 Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
author_facet Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Dodis, Yevgeniy
Goldwasser, Shafi
author_sort Dodis, Yevgeniy
collection MIT
description 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
first_indexed 2024-09-23T13:22:01Z
format Article
id mit-1721.1/73868
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T13:22:01Z
publishDate 2012
publisher Springer Berlin / Heidelberg
record_format dspace
spelling mit-1721.1/738682022-09-28T13:40:50Z Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography Public-Key Encryption Schemes with Auxiliary Inputs Dodis, Yevgeniy Goldwasser, Shafi Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Goldwasser, Shafi 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields. National Science Foundation (U.S.) (Grant CCF-0514167) National Science Foundation (U.S.) (Grant CCF-0635297) National Science Foundation (U.S.) (Grant NSF-0729011) Israel Science Foundation (700/08) Chais Family Fellows Program 2012-10-10T19:18:35Z 2012-10-10T19:18:35Z 2010-02 2010-02 Article http://purl.org/eprint/type/ConferencePaper 978-3-642-11798-5 0302-9743 1611-3349 http://hdl.handle.net/1721.1/73868 Dodis, Yevgeniy et al. “Public-Key Encryption Schemes with Auxiliary Inputs.” Theory of Cryptography. Ed. Daniele Micciancio. LNCS Vol. 5978. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 361–381. https://orcid.org/0000-0003-4728-1535 en_US http://dx.doi.org/10.1007/978-3-642-11799-2_22 Theory of Cryptography Creative Commons Attribution-Noncommercial-Share Alike 3.0 http://creativecommons.org/licenses/by-nc-sa/3.0/ application/pdf Springer Berlin / Heidelberg Other University Web Domain
spellingShingle Dodis, Yevgeniy
Goldwasser, Shafi
Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title_full Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title_fullStr Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title_full_unstemmed Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title_short Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
title_sort public key encryption schemes with auxiliary inputs theory of cryptography
url http://hdl.handle.net/1721.1/73868
https://orcid.org/0000-0003-4728-1535
work_keys_str_mv AT dodisyevgeniy publickeyencryptionschemeswithauxiliaryinputstheoryofcryptography
AT goldwassershafi publickeyencryptionschemeswithauxiliaryinputstheoryofcryptography
AT dodisyevgeniy publickeyencryptionschemeswithauxiliaryinputs
AT goldwassershafi publickeyencryptionschemeswithauxiliaryinputs