首页> 外文学位 >Polynomial reconstruction based cryptography.
【24h】

Polynomial reconstruction based cryptography.

机译:基于多项式重建的密码学。

获取原文
获取原文并翻译 | 示例

摘要

An important direction in Cryptographic Research is the identification and investigation of hard computational problems upon which the security of cryptographic primitives and protocols can be based. This is important because: (i) the properties of a certain cryptographic primitive depend to a great extent on the properties of the underlying hard computational problem that is used as an intractability assumption. Employing new plausible intractability assumptions with rich algebraic structure would presumably give rise to cryptographic primitives with unique and novel properties; (ii) the listing of “hard” computational problems that has been utilized in the design of cryptographic primitives is not very large; this motivates the investigation of novel cryptographic assumptions, as different problems will most likely react differently in stronger adversarial models that become feasible with technical/technological advances.; In this thesis, the Problem of Reed-Solomon Codes Decoding—a well-known computational problem in the theory of Error-Correcting Codes, also known as Polynomial Reconstruction (PR)—is considered from the cryptographic hardness perspective. Following the standard methodology in the cryptographic literature which includes the investigation of a Decisional Intractability Assumption related to PR as well as the establishment of results such as Hardness of Partial Information Extraction and Pseudorandomness, we lay out the theoretical framework for the exploitation of PR in Cryptography.; Subsequently, we present a wide array of concrete applications of PR in Cryptography: (i) basic primitives, such as a probabilistic one-way function with strong concealment properties which gives rise to commitment schemes with unique properties; (ii) symmetric encryption methods with strong security properties such as forward secrecy, computational perfect secrecy, and key-equivalence; (iii) a generic protocol for efficient secure function evaluation over the domain of polynomial expressions. We also consider applications of our work in the Coding Theoretic setting: we investigate the solvability of Interleaved Reed-Solomon Codes Decoding in the presence of random errors, and we discover interesting hardness/self-reducibility tradeoffs in Decoding Problems (including the PR problem). Finally we describe directions for future research that are spawned from the results of this thesis.
机译:密码学研究的一个重要方向是识别和研究硬计算问题,密码原语和协议的安全性可基于这些问题。这很重要,因为:(i)某种密码原语的属性在很大程度上取决于用作难处理性假设的基础硬计算问题的属性。采用具有丰富的代数结构的新的可能的难处理性假设可能会产生具有独特和新颖特性的密码原语。 (ii)在密码原语设计中使用的“硬”计算问题的列表不是很大;这激发了对新的密码学假设的研究,因为不同的问题很可能在更强大的对抗模型中做出不同的反应,而对抗模型随着技术的进步而变得可行。在本文中,从密码硬度的角度考虑了里德-所罗门码解码问题,这是纠错码理论中众所周知的计算问题,也称为多项式重构(PR)。遵循密码学文献中的标准方法,包括研究与PR相关的决策难治性假设以及建立诸如部分信息提取的难度和伪随机性之类的结果,我们为密码学中的PR开发提供了理论框架。;随后,我们介绍了PR在密码学中的各种具体应用:(i)基本图元,例如具有强大隐蔽特性的概率单向函数,从而产生具有独特特性的承诺方案; (ii)具有强大安全性的对称加密方法,例如前向保密性,计算完美保密性和密钥等效性; (iii)在多项式表达式范围内进行有效安全功能评估的通用协议。我们还考虑了我们的工作在编码理论环境中的应用:我们在存在随机错误的情况下研究了交错的Reed-Solomon码解码的可解性,并且在解码问题(包括PR问题)中发现了有趣的硬度/自简化性折衷方案。最后,我们描述了从本文的结果得出的未来研究方向。

著录项

  • 作者

    Kiayias, Aggelos.;

  • 作者单位

    City University of New York.;

  • 授予单位 City University of New York.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2002
  • 页码 174 p.
  • 总页数 174
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号