Sciweavers

TCC
2010
Springer

Public-Key Encryption Schemes with Auxiliary Inputs

14 years 1 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key informationtheoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala
Added 17 Mar 2010
Updated 17 Mar 2010
Type Conference
Year 2010
Where TCC
Authors Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan
Comments (0)