Affiliation:
1. Weizmann Institute of Science, Rehovot, Israel
Abstract
We describe efficient constructions for various cryptographic primitives in private-key as well as public-key cryptography. Our main results are two new constructions of pseudo-random functions. We prove the pseudo-randomness of one construction under the assumption that
factoring
(Blum integers) is hard while the other construction is pseudo-random if the
decisional version of the Diffie--Hellman
assumption holds. Computing the value of our functions at any given point involves two subset products. This is much more efficient than previous proposals. Furthermore, these functions have the advantage of being in
TC
0
(the class of functions computable by constant depth circuits consisting of a polynomial number of threshold gates). This fact has several interesting applications. The simple algebraic structure of the functions implies additional features such as a zero-knowledge proof for statements of the form "
y
=
f
s
(
x
)" and "
y
≠
f
s
(
x
)" given a commitment to a key
s
of a pseudo-random function
f
s
.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference64 articles.
1. When Won′t Membership Queries Help?
2. Log Depth Circuits for Division and Related Problems
3. Biham E. Boneh D. and Reingold O. 1997. Breaking generalized Diffie--Hellman modulo a composite is no easier than Factoring. Theory of Cryptography Library Record 97-14 at: http://theory. lcs.mit.edu/ tcryptol/homepage.html]] Biham E. Boneh D. and Reingold O. 1997. Breaking generalized Diffie--Hellman modulo a composite is no easier than Factoring. Theory of Cryptography Library Record 97-14 at: http://theory. lcs.mit.edu/ tcryptol/homepage.html]]
Cited by
242 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献