首页> 外文会议>Annual International Cryptology Conference; 20070819-23; Santa Barbara,CA(US) >Cryptography with Constant Input Locality (Extended Abstract)
【24h】

Cryptography with Constant Input Locality (Extended Abstract)

机译:具有恒定输入局部性的密码学(扩展摘要)

获取原文
获取原文并翻译 | 示例

摘要

We study the following natural question: Which cryptographic primitives (if any) can be realized by functions with constant input locality, namely functions in which every bit of the input influences only a constant number of bits of the output? This continues the study of cryptography in low complexity classes. It was recently shown (Applebaum et al., FOCS 2004) that, under standard cryptographic assumptions, most cryptographic primitives can be realized by functions with constant output locality, namely ones in which every bit of the output is influenced by a constant number of bits from the input. We (almost) characterize what cryptographic tasks can be performed with constant input locality. On the negative side, we show that primitives which require some form of non-malleability (such as digital signatures, message authentication, or non-malleable encryption) cannot be realized with constant input locality. On the positive side, assuming the intractability of certain problems from the domain of error correcting codes (namely, hardness of decoding a random linear code or the security of the McEliece cryptosystem), we obtain new constructions of one-way functions, pseudorandom generators, commitments, and semantically-secure public-key encryption schemes whose input locality is constant. Moreover, these constructions also enjoy constant output locality. Therefore, they give rise to cryptographic hardware that has constant-depth, constant fan-in and constant fan-out. As a byproduct, we obtain a pseudorandom generator whose output and input locality are both optimal (namely, 3).
机译:我们研究以下自然问题:哪些密码原语(如果有的话)可以通过具有恒定输入局部性的函数来实现,即输入的每一位仅影响输出的恒定位数的函数?这继续了低复杂度类中密码学的研究。最近显示(Applebaum等人,FOCS 2004),在标准密码学假设下,大多数密码原语可以通过具有恒定输出局部性的函数来实现,即其中输出的每一位都受到恒定位数的影响的函数。从输入。我们(几乎)描述了在恒定的输入局部性下可以执行哪些加密任务。从消极的一面,我们表明要求某种形式的非恶意性(例如数字签名,消息身份验证或非恶意性加密)的原语不能在恒定的输入局部性下实现。从积极的方面来看,假设来自纠错码领域的某些问题(例如,解码随机线性码的难度或McEliece密码系统的安全性)具有难处理性,我们将获得单向函数,伪随机发生器,承诺,以及输入位置恒定的语义安全的公共密钥加密方案。此外,这些结构还具有恒定的输出局部性。因此,它们产生了具有恒定深度,恒定扇入和恒定扇出的加密硬件。作为副产品,我们获得了一个伪随机数生成器,其输出和输入局部性均最佳(即3)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号