Public-key encryption schemes with auxiliary inputs

  • Authors:
  • Yevgeniy Dodis;Shafi Goldwasser;Yael Tauman Kalai;Chris Peikert;Vinod Vaikuntanathan

  • Affiliations:
  • New York University;MIT and Weizmann Institute;Microsoft Research;Georgia Institute of Technology;IBM Research

  • Venue:
  • TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.