Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Public-Key Cryptography from Different Assumptions Benny Applebaum
 

Summary: Public-Key Cryptography from Different Assumptions
Benny Applebaum
Boaz Barak
Avi Wigderson
November 7, 2009
Abstract
This paper attempts to broaden the foundations of public-key cryptography. We construct
new public key encryption schemes based on new hardness-on-average assumptions for natural
combinatorial NP-hard optimization problems. We consider the following assumptions:
1. It is infeasible to solve a random set of sparse linear equations mod 2, of which a small
fraction is noisy.
2. It is infeasible to distinguish between a random unbalanced bipartite graph, and such a
graph in which we "plant" at random in the large side a set S with only |S|/3 neighbors.
3. There is a pseudorandom generator in NC0
where every output depends on a random
constant-size subset of the inputs.
We obtain semantically secure public key encryption schemes based on several combinations
of these assumptions with different parameters. In particular we obtain public key encryption
from Assumption 1 on its own, yielding the first noisy-equations type public key scheme in
which the noise rate is higher than one over the square root of equations. We also obtain

  

Source: Applebaum, Benny - Faculty of Mathematics and Computer Science, Weizmann Institute of Science
Wigderson, Avi - Institute for Advanced Study, Princeton University

 

Collections: Computer Technologies and Information Sciences; Mathematics