2013
DOI: 10.1007/978-3-642-36594-2_38
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic (Trapdoor) One-Way Functions and Their Applications

Abstract: Abstract. In this paper we introduce the notion of Algebraic (Trapdoor) One Way Functions, which, roughly speaking, captures and formalizes many of the properties of number-theoretic one-way functions. Informally, a (trapdoor) one way function F : X → Y is said to be algebraic if X and Y are (finite) abelian cyclic groups, the function is homomor-, and is ring-homomorphic, meaning that it is possible to compute linear operations "in the exponent" over some ring (which may be different from Zp where p is the or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
32
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 46 publications
(32 citation statements)
references
References 35 publications
0
32
0
Order By: Relevance
“…The subject became popular more recently, due to an important application of homomorphic signatures to linear network coding. Efficient schemes of this primitive have been proposed both in the random oracle [10,27,12,17] and in the standard model [1,2,18,19,23,3]. Realizations for more complex functionalities (i.e., beyond linear) have been proposed only very recently [11,28,16,4].…”
mentioning
confidence: 99%
“…The subject became popular more recently, due to an important application of homomorphic signatures to linear network coding. Efficient schemes of this primitive have been proposed both in the random oracle [10,27,12,17] and in the standard model [1,2,18,19,23,3]. Realizations for more complex functionalities (i.e., beyond linear) have been proposed only very recently [11,28,16,4].…”
mentioning
confidence: 99%
“…However, since then, most works focus solely on linear functions, mainly because of the important application to network coding [14]. Several efficient schemes for linear functions have been proposed both in the random oracle model [14,29,16,18] and in the standard model [1,5,19,20,26,6,7]. Three more recent works consider the case of larger classes of functions [15,30,17].…”
Section: Related Workmentioning
confidence: 99%
“…As we mentioned earlier, the problem considered by our work and addressed via homomorphic authenticators is related to the notion of verifiable computation for which there exits a vast literature, ranging from works for arbitrary computations [36,40,32,27,21,2,47,28,46] to works for specific classes of computations [11,25,43,18]. In verifiable computation, a client wants to delegate a computationally heavy task to a remote server while being able to verify the result in a very efficient way.…”
Section: Related Workmentioning
confidence: 99%
“…In verifiable computation [30,26,22,2,41,40,24,18,21], a client outsources a computationally intensive task to a server and verifies its results in an efficient manner upon its completion. The basic question was formulated in work on interactive proofs (IP) [8,31], efficient arguments based on probabilistically checkable proofs (PCP) [35,36], and computationally sound (CS) proofs [38].…”
Section: Related Workmentioning
confidence: 99%