Browsing FAS Scholarly Articles by Keyword "cryptography"
Now showing items 1-5 of 5
-
Characterizing Pseudoentropy and Simplifying Pseudorandom Generator Constructions
(ACM Press, 2012)We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointly distributed random variables such that B takes values in a polynomial-sized set. We show that B is computationally ... -
On Approximating the Entropy of Polynomial Mappings
(2017-09-14)We investigate the complexity of Polynomial Entropy Approximation (PEA): Given a low-degree polynomial mapping p : F^n-> F^m, where F is a finite field, approximate the output entropy H(p(U_n)), where U_n is the uniform ... -
On the (Im)possibility of Obfuscating Programs
(Association for Computing Machinery (ACM), 2012)Informally, an obfuscator O is an (efficient, probabilistic) “compiler” that takes as input a program (or circuit) P and produces a new program O(P) that has the same functionality as P yet is “unintelligible” in some ... -
Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function
(Society for Industrial & Applied Mathematics (SIAM), 2009)We give a construction of statistically hiding commitment schemes (those in which the hiding property holds against even computationally unbounded adversaries) under the minimal complexity assumption that one-way functions ... -
Universal One-Way Hash Functions via Inaccessible Entropy
(Springer Verlag, 2010)This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and ...