【24h】

Cryptography in an Unbounded Computational Model

机译:无限计算模型中的密码学

获取原文
获取原文并翻译 | 示例

摘要

We investigate the possibility of cryptographic primitives over nonclassical computational models. We replace the traditional finite field F_n~* with the infinite field Q of rational numbers, and we give all parties unbounded computational power. We also give parties the ability to sample random real numbers. We determine that secure signature schemes and secure encryption schemes do not exist. We then prove more generally that it is impossible for two parties to agree upon a shared secret in this model. This rules out many other cryptographic primitives, such as Diffie-Hellman key exchange, oblivious transfer and interactive encryption.
机译:我们调查了非经典计算模型上的加密原语的可能性。我们用有理数的无限域Q代替传统的有限域F_n〜*,并赋予各方无穷大的计算能力。我们还使各方能够对随机实数进行采样。我们确定不存在安全签名方案和安全加密方案。然后,我们更普遍地证明,在该模型中,两个当事方不可能就共享的秘密达成共识。这排除了许多其他加密原语,例如Diffie-Hellman密钥交换,遗忘传输和交互式加密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号