dc.contributor.author | Dodis, Yevgeniy | |
dc.contributor.author | Goldwasser, Shafi | |
dc.date.accessioned | 2012-10-10T19:18:35Z | |
dc.date.available | 2012-10-10T19:18:35Z | |
dc.date.issued | 2010-02 | |
dc.date.submitted | 2010-02 | |
dc.identifier.isbn | 978-3-642-11798-5 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/73868 | |
dc.description | 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings | en_US |
dc.description.abstract | We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems.
As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Grant CCF-0514167) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Grant CCF-0635297) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Grant NSF-0729011) | en_US |
dc.description.sponsorship | Israel Science Foundation (700/08) | en_US |
dc.description.sponsorship | Chais Family Fellows Program | en_US |
dc.language.iso | en_US | |
dc.publisher | Springer Berlin / Heidelberg | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-642-11799-2_22 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | Other University Web Domain | en_US |
dc.title | Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography | en_US |
dc.title.alternative | Public-Key Encryption Schemes with Auxiliary Inputs | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Dodis, Yevgeniy et al. “Public-Key Encryption Schemes with Auxiliary Inputs.” Theory of Cryptography. Ed. Daniele Micciancio. LNCS Vol. 5978. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 361–381. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Goldwasser, Shafi | |
dc.relation.journal | Theory of Cryptography | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod | en |
dc.identifier.orcid | https://orcid.org/0000-0003-4728-1535 | |
dspace.mitauthor.error | true | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |