How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Solving low-density subset sum problems
Journal of the ACM (JACM)
The NP-completeness column: An ongoing guide
Journal of Algorithms
Random generation of combinatorial structures from a uniform
Theoretical Computer Science
Average case complete problems
SIAM Journal on Computing
Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Zero-knowledge simulation of Boolean circuits
Proceedings on Advances in cryptology---CRYPTO '86
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Random instances of a graph coloring problem are hard
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Generalized Kolmogorov complexity and the structure of feasible computations
SFCS '83 Proceedings of the 24th Annual Symposium on Foundations of Computer Science
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Complete and incomplete randomized NP problems
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Hi-index | 0.00 |
We consider the efficient generation of solved instances of computational problems. In particular, we consider invulnerable generators. Let S be a subset of {0,1}* and M be a Turing Machine that accepts S; an accepting computation w of M on input x is called a "witness" that x 驴 S. Informally, a program is an 驴-invulnerable generator if, on input 1n, it produces instance-witness pairs (x, w), with |x| = n, according to a distribution under which any polynomial-time adversary who is given x fails to find a witness that x 驴 S, with probability at least 驴, for infinitely many lengths n.The question of which sets have invulnerable generators is intrinsically appealing theoretically, and the results can be applied to the generation of test data for heuristic algorithms and to the theory of zero-knowledge proof systems. The existence of invulnerable generators. is closely related to the existence of cryptographically secure one-way functions. We prove three theorems about invulnerability. The first addresses the question of which sets in NP have invulnerable generators, if indeed any NP sets do. The second addresses the question of how invulnerable these generators are.