2009
DOI: 10.1016/s0065-2458(09)01204-2
|View full text |Cite
|
Sign up to set email alerts
|

Chapter 4 A Status Report on the P Versus NP Question

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 93 publications
0
1
0
Order By: Relevance
“…The computational security relies on unproven assumptions, but the information-theoretic security does not require such assumptions. Any unconditional proof for computationally secure cryptographic schemes requires proving that P = N P , which is still an unsolved problem in computer science [120][121][122], but may be proved in the future. However, the information-theoretic security enforces some requirements which affects the practicability of a cryptographic scheme.…”
Section: Information-theoretic Vs Computational Securitymentioning
confidence: 99%
“…The computational security relies on unproven assumptions, but the information-theoretic security does not require such assumptions. Any unconditional proof for computationally secure cryptographic schemes requires proving that P = N P , which is still an unsolved problem in computer science [120][121][122], but may be proved in the future. However, the information-theoretic security enforces some requirements which affects the practicability of a cryptographic scheme.…”
Section: Information-theoretic Vs Computational Securitymentioning
confidence: 99%