Show simple item record

dc.contributor.authorDegwekar, Akshay Dhananjai
dc.contributor.authorVaikuntanathan, Vinod
dc.contributor.authorVasudevan, Prashant
dc.date.accessioned2017-08-30T17:35:22Z
dc.date.available2017-08-30T17:35:22Z
dc.date.issued2017-08-30
dc.identifier.isbn978-3-662-53014-6
dc.identifier.isbn978-3-662-53015-3
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/111069
dc.description.abstractFine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources (time, space or parallel-time), where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries (Merkle, CACM 1978), space-bounded adversaries (Cachin and Maurer, CRYPTO 1997) and parallel-time-bounded adversaries (Håstad, IPL 1987). Our goal is come up with fine-grained primitives (in the setting of parallel-time-bounded adversaries) and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We show: 1. NC¹-cryptography: Under the assumption that Open image in new window, we construct one-way functions, pseudo-random generators (with sub-linear stretch), collision-resistant hash functions and most importantly, public-key encryption schemes, all computable in NC¹ and secure against all NC¹ circuits. Our results rely heavily on the notion of randomized encodings pioneered by Applebaum, Ishai and Kushilevitz, and crucially, make non-black-box use of randomized encodings for logspace classes. 2. AC⁰-cryptography: We construct (unconditionally secure) pseudo-random generators with arbitrary polynomial stretch, weak pseudo-random functions, secret-key encryption and perhaps most interestingly, collision-resistant hash functions, computable in AC⁰ and secure against all AC⁰ circuits. Previously, one-way permutations and pseudo-random generators (with linear stretch) computable in AC⁰ and secure against AC⁰ circuits were known from the works of Håstad and Braverman.en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Contract W911NF-15-C-0226)en_US
dc.description.sponsorshipUnited States. Army Research Office (Contract W911NF-15-C-0226)en_US
dc.language.isoen_US
dc.publisherSpringeren_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-662-53015-3_19en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT Web Domainen_US
dc.titleFine-Grained Cryptographyen_US
dc.typeArticleen_US
dc.identifier.citationDegwekar, Akshay et al. “Fine-Grained Cryptography.” Advances in Cryptology – CRYPTO 2016. Lecture Notes in Computer Science 9816 (2016): 533–562. © 2016 International Association for Cryptologic Researchen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorDegwekar, Akshay Dhananjai
dc.contributor.mitauthorVaikuntanathan, Vinod
dc.contributor.mitauthorVasudevan, Prashant
dc.relation.journalAdvances in Cryptology – CRYPTO 2016en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsDegwekar, Akshay; Vaikuntanathan, Vinod; Vasudevan, Prashant Nalinien_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-8354-0621
dc.identifier.orcidhttps://orcid.org/0000-0002-2666-0045
dc.identifier.orcidhttps://orcid.org/0000-0002-0522-7023
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record