Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
Author(s)
Dodis, Yevgeniy; Goldwasser, Shafi
DownloadGoldwasser-Public-key encryption.pdf (254.1Kb)
OPEN_ACCESS_POLICY
Open Access Policy
Creative Commons Attribution-Noncommercial-Share Alike
Alternative title
Public-Key Encryption Schemes with Auxiliary Inputs
Terms of use
Metadata
Show full item recordAbstract
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems.
As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.
Description
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
Date issued
2010-02Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer ScienceJournal
Theory of Cryptography
Publisher
Springer Berlin / Heidelberg
Citation
Dodis, Yevgeniy et al. “Public-Key Encryption Schemes with Auxiliary Inputs.” Theory of Cryptography. Ed. Daniele Micciancio. LNCS Vol. 5978. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 361–381.
Version: Author's final manuscript
ISBN
978-3-642-11798-5
ISSN
0302-9743
1611-3349