Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Springer Berlin / Heidelberg,
2012-10-10T19:18:35Z.
|
Subjects: | |
Online Access: | Get fulltext |
Summary: | 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields. National Science Foundation (U.S.) (Grant CCF-0514167) National Science Foundation (U.S.) (Grant CCF-0635297) National Science Foundation (U.S.) (Grant NSF-0729011) Israel Science Foundation (700/08) Chais Family Fellows Program |
---|