Hard Languages in NP∩ coNP and NIZK Proofs from Unstructured Hardness
The existence of “unstructured” hard languages in NP ∩ coNP is an intriguing open question.
Bennett and Gill (SICOMP, 1981) asked whether P is separated from NP ∩ coNP relative …
Bennett and Gill (SICOMP, 1981) asked whether P is separated from NP ∩ coNP relative …
[BOOK][B] Limits on the Pseudorandomness of Low-Degree Polynomials over the Integers
ALW Korb - 2020 - search.proquest.com
We initiate the study of a problem called the Polynomial Independence Distinguishing
Problem (PIDP). The problem is parameterized by a set of polynomials Q=(q 1,..., qm) of n …
Problem (PIDP). The problem is parameterized by a set of polynomials Q=(q 1,..., qm) of n …
[HTML][HTML] Beyond the csiszár–körner bound: best-possible wiretap coding via obfuscation
A wiretap coding scheme (Wyner in Bell Syst Tech J 54(8):1355–1387, 1975) enables Alice
to reliably communicate a message m to an honest Bob by sending an encoding c over a …
to reliably communicate a message m to an honest Bob by sending an encoding c over a …
Streaming functional encryption
We initiate the study of streaming functional encryption (sFE) which is designed for scenarios
in which data arrives in a streaming manner and is computed on in an iterative manner as …
in which data arrives in a streaming manner and is computed on in an iterative manner as …
Amplifying the security of functional encryption, unconditionally
Security amplification is a fundamental problem in cryptography. In this work, we study security
amplification for functional encryption (FE). We show two main results: For any constant $…
amplification for functional encryption (FE). We show two main results: For any constant $…
Hard Languages in and NIZK Proofs from Unstructured Hardness
The existence of" unstructured" hard languages in $\mathsf {NP}\,\cap\,\mathsf {coNP} $ is an
intriguing open question. Bennett and Gill (SICOMP, 1981) asked whether $\mathsf {P} $ is …
intriguing open question. Bennett and Gill (SICOMP, 1981) asked whether $\mathsf {P} $ is …
Adaptively Secure Streaming Functional Encryption
This paper introduces the first adaptively secure streaming functional encryption (sFE)
scheme for P/Poly. sFE stands as an evolved variant of traditional functional encryption (FE), …
scheme for P/Poly. sFE stands as an evolved variant of traditional functional encryption (FE), …
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
We initiate the study of a problem called the Polynomial Independence Distinguishing
Problem (PIDP). The problem is parameterized by a set of polynomials $\mathcal {Q}=(q_1,\ldots, …
Problem (PIDP). The problem is parameterized by a set of polynomials $\mathcal {Q}=(q_1,\ldots, …
Expanding COVID-19 symptom screening to retail, restaurants, and schools by preserving privacy using relaxed digital signatures
Symptom screening is a widely deployed strategy to mitigate the COVID-19 pandemic and
many public health authorities are mandating its use by employers for all employees in the …
many public health authorities are mandating its use by employers for all employees in the …
[PDF][PDF] Amplifying the Security of Functional Encryption, Unconditionally
… Alexis Korb …