2003
DOI: 10.1007/978-3-540-45146-4_4
|View full text |Cite
|
Sign up to set email alerts
|

On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model

Abstract: Abstract. We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (CRYPTO '02 ), locally computable extractors directly yield secure private-key cryptosystems in Maurer's bounded storage model (J. Cryptology, 1992). We suggest a general "sample-then-extract" approach to constructing locally computable extractors. Plugging in known sampler and extractor constructions, we obtain locally computab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
136
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 75 publications
(141 citation statements)
references
References 30 publications
5
136
0
Order By: Relevance
“…On the other hand an eavesdropper who can store up to a constant fraction of R (e.g. 1 2 r bits) cannot learn anything about the messages (this was shown initially in [2] and improved in [1,9,11,20] and ultimately in [27]). These encryption schemes have the important property called everlasting security (put forward in [1,9]), where once the broadcast is over and R is no longer accessible then the message remains secure even if the private key is exposed and Charlie gains stronger storage capabilities.…”
Section: The Bounded Storage Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand an eavesdropper who can store up to a constant fraction of R (e.g. 1 2 r bits) cannot learn anything about the messages (this was shown initially in [2] and improved in [1,9,11,20] and ultimately in [27]). These encryption schemes have the important property called everlasting security (put forward in [1,9]), where once the broadcast is over and R is no longer accessible then the message remains secure even if the private key is exposed and Charlie gains stronger storage capabilities.…”
Section: The Bounded Storage Modelmentioning
confidence: 99%
“…However, it is not efficient in the sense that the number of bits read from the random oracle is far larger than the actual key. This may be greatly improved by using one of the known schemes for private key encryption in the regular (non-hybrid) bounded storage model, such as the scheme in [20,27]. The ensuing hybrid scheme that is described next achieves comparable parameters to the scheme of [27].…”
Section: Everlasting Security With a Random Oraclementioning
confidence: 99%
See 1 more Smart Citation
“…Most of the previous work on the bounded storage model concentrated on private key encryption [19,10,2,1,14,15,18,25], Key Agreement [10] and Oblivious Transfer [9,12,13]. In contrast, the notion of non-interactive timestamping cannot be implemented in the "standard cryptographic setting".…”
Section: The Bounded Storage Modelmentioning
confidence: 99%
“…A stronger notion of efficiency called "locally-computable" was suggested in [25]. It requires the honest players to store a small substring of the string r. More precisely, the players need to choose a subset S ⊆ [R] before the random string is transmitted and only store r| S .…”
Section: Online Versus Locally-computablementioning
confidence: 99%