Journal of Cryptology最新文献

筛选
英文 中文
On the Hardness of Module Learning with Errors with Short Distributions 关于具有短分布误差的模块学习的硬度
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-11-30 DOI: 10.1007/s00145-022-09441-3
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
{"title":"On the Hardness of Module Learning with Errors with Short Distributions","authors":"Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen","doi":"10.1007/s00145-022-09441-3","DOIUrl":"https://doi.org/10.1007/s00145-022-09441-3","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45712043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The Inverse of χdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$chi $$end{document} and Its Applications to Rasta-Li The Inverse of χdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$chi $$end{document} and Its Applications to Rasta-Li
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-10-01 DOI: 10.1007/s00145-022-09439-x
Fukang Liu, Santanu Sarkar, W. Meier, Takanori Isobe
{"title":"The Inverse of χdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$chi $$end{document} and Its Applications to Rasta-Li","authors":"Fukang Liu, Santanu Sarkar, W. Meier, Takanori Isobe","doi":"10.1007/s00145-022-09439-x","DOIUrl":"https://doi.org/10.1007/s00145-022-09439-x","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49102952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Perfectly Secure Computation with Optimal Resilience 具有最佳弹性的高效完全安全计算
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-09-27 DOI: 10.1007/s00145-022-09434-2
Ittai Abraham, Gilad Asharov, Avishay Yanai
{"title":"Efficient Perfectly Secure Computation with Optimal Resilience","authors":"Ittai Abraham, Gilad Asharov, Avishay Yanai","doi":"10.1007/s00145-022-09434-2","DOIUrl":"https://doi.org/10.1007/s00145-022-09434-2","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44010237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Signed (Group) Diffie–Hellman Key Exchange with Tight Security 具有严密安全性的签名(组)Diffie-Hellman密钥交换
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-09-27 DOI: 10.1007/s00145-022-09438-y
Jiaxin Pan, Chen Qian, Magnus Ringerud
{"title":"Signed (Group) Diffie–Hellman Key Exchange with Tight Security","authors":"Jiaxin Pan, Chen Qian, Magnus Ringerud","doi":"10.1007/s00145-022-09438-y","DOIUrl":"https://doi.org/10.1007/s00145-022-09438-y","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44629100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version 用亏格理论破解类群作用的决策Diffie-Hellman问题:扩展版
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-09-15 DOI: 10.1007/s00145-022-09435-1
W. Castryck, Jana Sotáková, F. Vercauteren
{"title":"Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version","authors":"W. Castryck, Jana Sotáková, F. Vercauteren","doi":"10.1007/s00145-022-09435-1","DOIUrl":"https://doi.org/10.1007/s00145-022-09435-1","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44262514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the (in)Security of ROS 关于活性氧的安全性
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-09-15 DOI: 10.1007/s00145-022-09436-0
Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
{"title":"On the (in)Security of ROS","authors":"Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova","doi":"10.1007/s00145-022-09436-0","DOIUrl":"https://doi.org/10.1007/s00145-022-09436-0","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47814630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
ZK-PCPs from Leakage-Resilient Secret Sharing 泄漏弹性秘密共享的zk - pcp
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-07-25 DOI: 10.1007/s00145-022-09433-3
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
{"title":"ZK-PCPs from Leakage-Resilient Secret Sharing","authors":"Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss","doi":"10.1007/s00145-022-09433-3","DOIUrl":"https://doi.org/10.1007/s00145-022-09433-3","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47565523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Complexity of Compressing Obfuscation 论压缩混淆的复杂性
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-07-06 DOI: 10.1007/s00145-022-09431-5
Gilad Asharov, Ilan Komargodski, Rafael Pass, Naomi Sirkin
{"title":"On the Complexity of Compressing Obfuscation","authors":"Gilad Asharov, Ilan Komargodski, Rafael Pass, Naomi Sirkin","doi":"10.1007/s00145-022-09431-5","DOIUrl":"https://doi.org/10.1007/s00145-022-09431-5","url":null,"abstract":"<p>Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to its far-reaching applications in cryptography and other fields. However, to date, obtaining a plausibly secure construction has been an illusive task, thus motivating the study of seemingly weaker primitives that imply it, with the possibility that they will be easier to construct. In this work, we provide a systematic study of compressing obfuscation, one of the most natural and simple to describe primitives that is known to imply indistinguishability obfuscation when combined with other standard assumptions. A compressing obfuscator is roughly an indistinguishability obfuscator that outputs just a slightly compressed encoding of the truth table. This generalizes notions introduced by Lin et al. (Functional signatures and pseudorandom functions, PKC, 2016) and Bitansky et al. (From Cryptomania to Obfustopia through secret-key functional encryption, TCC, 2016) by allowing for a broader regime of parameters. We view compressing obfuscation as an independent cryptographic primitive and show various positive and negative results concerning its power and plausibility of existence, demonstrating significant differences from full-fledged indistinguishability obfuscation. First, we show that as a cryptographic building block, compressing obfuscation is weak. In particular, when combined with one-way functions, it cannot be used (in a black-box way) to achieve public-key encryption, even under (sub-)exponential security assumptions. This is in sharp contrast to indistinguishability obfuscation, which together with one-way functions implies almost all cryptographic primitives. Second, we show that to construct compressing obfuscation with perfect correctness, one only needs to assume its existence with a very weak correctness guarantee and polynomial hardness. Namely, we show a correctness amplification transformation with optimal parameters that relies only on polynomial hardness assumptions. This implies a universal construction assuming only polynomially secure compressing obfuscation with approximate correctness. In the context of indistinguishability obfuscation, we know how to achieve such a result only under sub-exponential security assumptions together with derandomization assumptions. Lastly, we characterize the existence of compressing obfuscation with <i>statistical</i> security. We show that in some range of parameters and for some classes of circuits such an obfuscator <i>exists</i>, whereas it is unlikely to exist with better parameters or for larger classes of circuits. These positive and negative results reveal a deep connection between compressing obfuscation and various concepts in complexity theory and learning theory.</p>","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"2016 8","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-commutative Ring Learning with Errors from Cyclic Algebras 基于循环代数的非交换环误差学习
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-07-01 DOI: 10.1007/s00145-022-09430-6
Charles Grover, Andrew Mendelsohn, Cong Ling, R. Vehkalahti
{"title":"Non-commutative Ring Learning with Errors from Cyclic Algebras","authors":"Charles Grover, Andrew Mendelsohn, Cong Ling, R. Vehkalahti","doi":"10.1007/s00145-022-09430-6","DOIUrl":"https://doi.org/10.1007/s00145-022-09430-6","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"35 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51966606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Everlasting UC Commitments from Fully Malicious PUFs 完全恶意puf的永久UC承诺
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2022-07-01 DOI: 10.1007/s00145-022-09432-4
Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
{"title":"Everlasting UC Commitments from Fully Malicious PUFs","authors":"Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh","doi":"10.1007/s00145-022-09432-4","DOIUrl":"https://doi.org/10.1007/s00145-022-09432-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41964003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信