Sciweavers

773 search results - page 44 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
STOC
2007
ACM
111views Algorithms» more  STOC 2007»
16 years 2 months ago
Low-end uniform hardness vs. randomness tradeoffs for AM
In 1998, Impagliazzo and Wigderson [IW98] proved a hardness vs. randomness tradeoff for BPP in the uniform setting, which was subsequently extended to give optimal tradeoffs for t...
Ronen Shaltiel, Christopher Umans
ACISP
2001
Springer
15 years 6 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
14 years 1 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
PROVSEC
2009
Springer
15 years 8 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
ECAL
2005
Springer
15 years 7 months ago
Artificial Life Meets Anthropology: A Case of Aggression in Primitive Societies
One of the greatest challenges in the modern biological and social sciences has been to understand the evolution of altruistic and cooperative behaviors. General outlines of the an...
Mikhail S. Burtsev