×

Found 204 Documents (Results 1–100)

On one-way functions and sparse languages. (English) Zbl 07890220

Rothblum, Guy (ed.) et al., Theory of cryptography. 21st international conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14369, 219-237 (2023).
MSC:  94A17 68Q30
PDFBibTeX XMLCite
Full Text: DOI

Constant-round arguments from one-way functions. (English) Zbl 07844691

Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1537-1544 (2023).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

A duality between one-way functions and average-case symmetry of information. (English) Zbl 07844651

Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1039-1050 (2023).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Capturing one-way functions via NP-hardness of meta-complexity. (English) Zbl 07844650

Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1027-1038 (2023).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract). (English) Zbl 1519.94034

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 103-120 (2023).
MSC:  94A60 68M14 68M25
PDFBibTeX XMLCite
Full Text: DOI

On one-way functions from NP-complete problems. (English) Zbl 07877683

Lovett, Shachar (ed.), 37th computational complexity conference, CCC 2022, Philadelphia, PA, USA, July 20–23, 2022. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 234, Article 36, 24 p. (2022).
MSC:  68Q25
PDFBibTeX XMLCite
Full Text: DOI

Robustness of average-case meta-complexity via pseudorandomness. (English) Zbl 07774439

Leonardi, Stefano (ed.) et al., Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC ’22, Rome, Italy June 20–24, 2022. New York, NY: Association for Computing Machinery (ACM). 1575-1583 (2022).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

One-way functions and a conditional variant of MKTP. (English) Zbl 07799585

Bojańczyk, Mikołaj (ed.) et al., 41st IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2021, virtual conference, December 15–17, 2021. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 213, Article 7, 19 p. (2021).
MSC:  68N30 68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity. (English) Zbl 07765205

Khuller, Samir (ed.) et al., Proceedings of the 53rd annual ACM SIGACT symposium on theory of computing, STOC ’21, virtual, Italy, June 21–25, 2021. New York, NY: Association for Computing Machinery (ACM). 722-735 (2021).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

A black-box approach to post-quantum zero-knowledge in constant rounds. (English) Zbl 1486.94089

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 315-345 (2021).
MSC:  94A60 81P94 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Oblivious transfer is in MiniQCrypt. (English) Zbl 1479.94182

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 531-561 (2021).
MSC:  94A60 81P45 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Theory and application of computationally-independent one-way functions: interactive proof of ability – revisited. (English) Zbl 07388839

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 97-109 (2021).
MSC:  65-XX
PDFBibTeX XMLCite
Full Text: DOI

Cryptography from information loss. (English) Zbl 07650429

Vidick, Thomas (ed.), 11th innovations in theoretical computer science conference, ITCS 2020, Seattle, Washington, USA, January 12–14, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 151, Article 81, 27 p. (2020).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

On average-case hardness in TFNP from one-way functions. (English) Zbl 1485.94092

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 614-638 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? (English) Zbl 1531.94063

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 599-619 (2020).
MSC:  94A60 68P25 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Expander-based cryptography meets natural proofs. (English) Zbl 07559061

Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 18, 14 p. (2019).
PDFBibTeX XMLCite
Full Text: DOI

Distributional collision resistance beyond one-way functions. (English) Zbl 1509.94066

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 667-695 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Invisible sanitizable signatures and public-key encryption are equivalent. (English) Zbl 1440.94093

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 202-220 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

The journey from NP to TFNP hardness. (English) Zbl 1402.68067

Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 60, 21 p. (2017).
MSC:  68Q15 68Q17 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Black-box parallel garbled RAM. (English) Zbl 1409.94893

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 66-92 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hard communication channels for steganography. (English) Zbl 1398.94192

Seok-Hee Hong (ed.), 27th international symposium on algorithms and computation, ISAAC 2016, Sydney, Australia, December 12–14, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-026-2). LIPIcs – Leibniz International Proceedings in Informatics 64, Article 16, 13 p. (2016).
MSC:  94A62 94A40 94A60
PDFBibTeX XMLCite
Full Text: DOI

Indistinguishable proofs of work or knowledge. (English) Zbl 1407.94079

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 902-933 (2016).
MSC:  94A60 68M11
PDFBibTeX XMLCite
Full Text: DOI Link

On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-malleable functions and their applications. (English) Zbl 1395.94273

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 386-416 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimal computational split-state non-malleable codes. (English) Zbl 1382.94038

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 393-417 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits of random oracles in secure computation (extended abstract). (English) Zbl 1364.68206

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 23-33 (2014).
MSC:  68Q05 68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Coin flipping of any constant bias implies one-way functions. (English) Zbl 1315.94055

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 398-407 (2014).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Can optimally-fair coin tossing be based on one-way functions? (English) Zbl 1323.94108

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 217-239 (2014).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1293.94059

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 231-240 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A cookbook for black-box separations and a recipe for UOWHFs. (English) Zbl 1315.94053

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 662-679 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hashing with elliptic curve \(L\)-functions. (English) Zbl 1292.94123

Özbudak, Ferruh (ed.) et al., Arithmetic of finite fields. 4th international workshop, WAIFI 2012, Bochum, Germany, July 16–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31661-6/pbk). Lecture Notes in Computer Science 7369, 196-207 (2012).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

The curious case of non-interactive commitments – on the power of black-box vs. non-black-box use of primitives. (English) Zbl 1296.94131

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 701-718 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

UOWHFs from OWFs: trading regularity for efficiency. (English) Zbl 1304.94034

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 234-253 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The isomorphism conjecture for NP. (English) Zbl 1269.68053

Cooper, S. Barry (ed.) et al., Computability in context. Computation and logic in the real world. London: Imperial College Press (ISBN 978-1-84816-245-7/hbk; 978-1-84816-277-8/ebook). 19-48 (2011).
MSC:  68Q15 68-02
PDFBibTeX XMLCite

On Yao’s XOR-lemma. (English) Zbl 1304.68074

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 273-301 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Three XOR-lemmas – an exposition. (English) Zbl 1343.68112

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 248-272 (2011).
PDFBibTeX XMLCite
Full Text: DOI

A candidate counterexample to the easy cylinders conjecture. (English) Zbl 1343.68083

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 136-140 (2011).
MSC:  68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Candidate one-way functions based on expander graphs. (English) Zbl 1306.94056

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 76-87 (2011).
MSC:  94A60 05C75 05C90
PDFBibTeX XMLCite
Full Text: DOI

Collision-free hashing from lattice problems. (English) Zbl 1343.94055

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011).
MSC:  94A60 11H06
PDFBibTeX XMLCite
Full Text: DOI Link

On constructing 1-1 one-way functions. (English) Zbl 1343.94056

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 13-25 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Gate elimination for linear functions and new feebly secure constructions. (English) Zbl 1332.94064

Kulikov, Alexander (ed.) et al., Computer science – theory and applications. 6th international computer science symposium in Russia, CSR 2011, St. Petersburg, Russia, June 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20711-2/pbk). Lecture Notes in Computer Science 6651, 148-161 (2011).
MSC:  94A60 68Q25 94C10
PDFBibTeX XMLCite
Full Text: DOI

Time space tradeoffs for attacks against one-way functions and PRGs. (English) Zbl 1283.94061

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 649-665 (2010).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Universal one-way hash functions via inaccessible entropy. (English) Zbl 1280.94065

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 616-637 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Inaccessible entropy. (English) Zbl 1304.94014

Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 611-620 (2009).
MSC:  94A17 68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Reliable resource searching in P2P networks. (English) Zbl 1184.68114

Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 437-447 (2009).
MSC:  68M15 68M10
PDFBibTeX XMLCite
Full Text: DOI

Reducing complexity assumptions for oblivious transfer. (English) Zbl 1287.94062

Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 110-124 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the (im)possibility of key dependent encryption. (English) Zbl 1213.94105

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 202-219 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable multi-secret sharing schemes for multiple threshold access structures. (English) Zbl 1166.94341

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 167-181 (2008).
MSC:  94A62 11A51
PDFBibTeX XMLCite
Full Text: DOI Link

Basing weak public-key cryptography on strong one-way functions. (English) Zbl 1162.94339

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 55-72 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software