Public-key encryption schemes with auxiliary inputs
TCC, pp. 361-381, 2010.
large fieldauxiliary inputpublic-key cryptosystemscomputationally uninvertible functionsecret keyMore(6+)
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) proble...More
Full Text (Upload PDF)