2006
DOI: 10.1137/s0097539705446950
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography in $NC^0$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
115
1

Year Published

2006
2006
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 153 publications
(116 citation statements)
references
References 16 publications
0
115
1
Order By: Relevance
“…Such a construction may in fact be a pseudorandom generator, and hence a one-way function. 1 Applebaum, Ishai and Kushilevtiz [4,5] show that, under standard assumptions, there are one-way functions and pseudorandom generators that can be computed in N C 0 ; their one-way function is computable with right-degree 3. 2 In their construction, the graph encodes the computation of a log-space machine computing a one-way function that is used as a primitive.…”
Section: Goldreich's Function and Cryptography In Ncmentioning
confidence: 99%
“…Such a construction may in fact be a pseudorandom generator, and hence a one-way function. 1 Applebaum, Ishai and Kushilevtiz [4,5] show that, under standard assumptions, there are one-way functions and pseudorandom generators that can be computed in N C 0 ; their one-way function is computable with right-degree 3. 2 In their construction, the graph encodes the computation of a log-space machine computing a one-way function that is used as a primitive.…”
Section: Goldreich's Function and Cryptography In Ncmentioning
confidence: 99%
“…A result (we already mentioned briefly) by Applebaum, Ishai, Kushilevitz [AIK06] shows, under standard assumptions, that there are pseudorandom distributions computable by NC 0 circuits. Their result is obtained via a generic transformation that turns a distribution D into another "padded" distribution D that is computable in NC 0 and at the same time maintains interesting properties, such as pseudorandomness (but not stretch).…”
Section: Definition 12 a Function F : {0 1} → {0 1}mentioning
confidence: 91%
“…Blum-Micali-Yao). These use less resources than the algorithm to be derandomized, and in fact computing these generators can even be done in the restricted circuit class NC 0 [AIK06]. However, unconditional instantiations of these generators are rare, and in particular we are unaware of any unconditional cryptographic generator with large stretch, a key feature for derandomization.…”
Section: Definition 12 a Function F : {0 1} → {0 1}mentioning
confidence: 99%
See 1 more Smart Citation
“…Although the cloud infrastructures are much more powerful and reliable than personal computing devices, broad range of both internal and external threats for data integrity still exist. Examples of outages and data loss incidents of noteworthy cloud storage services appear from time to time [5], [6], [7], [8], [9].…”
Section: Proposed Systemmentioning
confidence: 99%