Show simple item record

dc.contributor.authorDodis, Yevgeniy
dc.contributor.authorGoldwasser, Shafi
dc.date.accessioned2012-10-10T19:18:35Z
dc.date.available2012-10-10T19:18:35Z
dc.date.issued2010-02
dc.date.submitted2010-02
dc.identifier.isbn978-3-642-11798-5
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/73868
dc.description7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedingsen_US
dc.description.abstractWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CCF-0514167)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CCF-0635297)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant NSF-0729011)en_US
dc.description.sponsorshipIsrael Science Foundation (700/08)en_US
dc.description.sponsorshipChais Family Fellows Programen_US
dc.language.isoen_US
dc.publisherSpringer Berlin / Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-11799-2_22en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceOther University Web Domainen_US
dc.titlePublic-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptographyen_US
dc.title.alternativePublic-Key Encryption Schemes with Auxiliary Inputsen_US
dc.typeArticleen_US
dc.identifier.citationDodis, Yevgeniy et al. “Public-Key Encryption Schemes with Auxiliary Inputs.” Theory of Cryptography. Ed. Daniele Micciancio. LNCS Vol. 5978. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. 361–381.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafi
dc.relation.journalTheory of Cryptographyen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsDodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinoden
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
dspace.mitauthor.errortrue
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record