【24h】

Fine-Grained Cryptography

机译:细长密度学

获取原文

摘要

Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources (time, space or parallel-time), where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries (Merkle, CACM 1978), space-bounded adversaries (Cachin and Maurer, CRYPTO 1997) and parallel-time-bounded adversaries (Hastad, IPL 1987). Our goal is come up with fine-grained primitives (in the setting of parallel-time-bounded adversaries) and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We show: 1. NC~1-cryptography: Under the assumption that NC~1 ≠ {direct+}L/poly, we construct one-way functions, pseudo-random generators (with sub-linear stretch), collision-resistant hash functions and most importantly, public-key encryption schemes, all computable in NC~1 and secure against all NC~1 circuits. Our results rely heavily on the notion of randomized encodings pioneered by Applebaum, Ishai and Kushilevitz, and crucially, make non-black-box use of randomized encodings for logspace classes. 2. AC~0-cryptography: We construct (unconditionally secure) pseudorandom generators with arbitrary polynomial stretch, weak pseudorandom functions, secret-key encryption and perhaps most interestingly, collision-resistant hash functions, computable in AC~0 and secure against all AC~0 circuits. Previously, one-way permutations and pseudo-random generators (with linear stretch) computable in AC~0 and secure against AC~0 circuits were known from the works of Hastad and Braverman.
机译:细粒度的加密原语是一种对逆境的对手来保护,具有a-prafti界多项式的资源量(时间,空间或并行时间),其中诚实的算法使用的资源较少,而不是他们设计为傻瓜的对手。先前在时间有限的对手(Merkle,Cacm 1978),空间有限的对手(Cachin和Maurer,Crypto 1997)和并行时界对手(Hastad,IPL 1987)中进行了这种基因。我们的目标是含有细粒度的原始原语(在不同的平行时间有界对手),并在可能的情况下表明这些结构的无条件安全性,或基本安全性广泛认为最坏情况复杂性等级。我们展示:1。NC〜1 - 加密:在假设NC〜1≠{Direct +} L / Poly,我们构建单向功能,伪随机发生器(带有子线性拉伸),抗冲击散列函数最重要的是,最重要的公钥加密方案,全部可在NC〜1中计算并对所有NC〜1电路安全。我们的结果严重依赖于AppleBaum,Ishaum和Kushilevitz的随机编码的概念,并且至关重要地,为LogSpace类进行无黑盒子使用随机编码。 2. AC〜0-密码:我们构建(无条件地保护)伪随机发生器,具有任意多项式延伸,弱伪随机函数,秘密密钥加密,也许是最有趣的,抗冲击散列功能,可在AC〜0中计算并防止所有AC安全〜0电路。以前,从Hastad和Braverman的作品中已知在AC〜0中计算的单向排列和伪随机发生器(具有线性拉伸)并防止AC〜0电路。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号