Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Cryptography with Constant Input Locality # Benny Applebaum + Yuval Ishai # Eyal Kushilevitz
 

Summary: Cryptography with Constant Input Locality #
Benny Applebaum + Yuval Ishai # Eyal Kushilevitz §
March 10, 2009
Abstract
We study the following natural question: Which cryptographic primitives (if any) can be
realized by functions with constant input locality, namely functions in which every bit of the
input influences only a constant number of bits of the output? This continues the study of
cryptography in low complexity classes. It was recently shown (Applebaum et al., FOCS 2004)
that, under standard cryptographic assumptions, most cryptographic primitives can be realized
by functions with constant output locality, namely ones in which every bit of the output is
influenced by a constant number of bits from the input.
We (almost) characterize what cryptographic tasks can be performed with constant input lo­
cality. On the negative side, we show that primitives which require some form of non­malleability
(such as digital signatures, message authentication, or non­malleable encryption) cannot be re­
alized with constant input locality. On the positive side, assuming the intractability of certain
problems from the domain of error correcting codes (namely, hardness of decoding a random
binary linear code or the security of the McEliece cryptosystem), we obtain new construc­
tions of one­way functions, pseudorandom generators, commitments, and semantically­secure
public­key encryption schemes whose input locality is constant. Moreover, these constructions
also enjoy constant output locality and thus they give rise to cryptographic hardware that has

  

Source: Applebaum, Benny - Faculty of Mathematics and Computer Science, Weizmann Institute of Science

 

Collections: Computer Technologies and Information Sciences