Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
Springer Berlin / Heidelberg
2012
|
Online Access: | http://hdl.handle.net/1721.1/73868 https://orcid.org/0000-0003-4728-1535 |
_version_ | 1826205974779658240 |
---|---|
author | Dodis, Yevgeniy Goldwasser, Shafi |
author2 | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
author_facet | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Dodis, Yevgeniy Goldwasser, Shafi |
author_sort | Dodis, Yevgeniy |
collection | MIT |
description | 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings |
first_indexed | 2024-09-23T13:22:01Z |
format | Article |
id | mit-1721.1/73868 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2024-09-23T13:22:01Z |
publishDate | 2012 |
publisher | Springer Berlin / Heidelberg |
record_format | dspace |
spelling | mit-1721.1/738682022-09-28T13:40:50Z Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography Public-Key Encryption Schemes with Auxiliary Inputs Dodis, Yevgeniy Goldwasser, Shafi Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Goldwasser, Shafi 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields. National Science Foundation (U.S.) (Grant CCF-0514167) National Science Foundation (U.S.) (Grant CCF-0635297) National Science Foundation (U.S.) (Grant NSF-0729011) Israel Science Foundation (700/08) Chais Family Fellows Program 2012-10-10T19:18:35Z 2012-10-10T19:18:35Z 2010-02 2010-02 Article http://purl.org/eprint/type/ConferencePaper 978-3-642-11798-5 0302-9743 1611-3349 http://hdl.handle.net/1721.1/73868 Dodis, Yevgeniy et al. “Public-Key Encryption Schemes with Auxiliary Inputs.” Theory of Cryptography. Ed. Daniele Micciancio. LNCS Vol. 5978. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 361–381. https://orcid.org/0000-0003-4728-1535 en_US http://dx.doi.org/10.1007/978-3-642-11799-2_22 Theory of Cryptography Creative Commons Attribution-Noncommercial-Share Alike 3.0 http://creativecommons.org/licenses/by-nc-sa/3.0/ application/pdf Springer Berlin / Heidelberg Other University Web Domain |
spellingShingle | Dodis, Yevgeniy Goldwasser, Shafi Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title_full | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title_fullStr | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title_full_unstemmed | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title_short | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography |
title_sort | public key encryption schemes with auxiliary inputs theory of cryptography |
url | http://hdl.handle.net/1721.1/73868 https://orcid.org/0000-0003-4728-1535 |
work_keys_str_mv | AT dodisyevgeniy publickeyencryptionschemeswithauxiliaryinputstheoryofcryptography AT goldwassershafi publickeyencryptionschemeswithauxiliaryinputstheoryofcryptography AT dodisyevgeniy publickeyencryptionschemeswithauxiliaryinputs AT goldwassershafi publickeyencryptionschemeswithauxiliaryinputs |