An Infinitely-Often One-Way Function Based on an Average-Case Assumption

نویسندگان

  • Edward A. Hirsch
  • Dmitry Itsykson
چکیده

We assume the existence of a function f that is computable in polynomial time but cannot be inverted by a randomized average-case polynomial algorithm. The cryptographic setting is, however, different: even for a weak one-way function, a successful adversary should fail on a polynomial fraction of inputs. Nevertheless, we show how to construct an infinitely-often one-way function based on f . §

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A VARIATIONAL APPROACH TO THE EXISTENCE OF INFINITELY MANY SOLUTIONS FOR DIFFERENCE EQUATIONS

The existence of infinitely many solutions for an anisotropic discrete non-linear problem with variable exponent according to p(k)–Laplacian operator with Dirichlet boundary value condition, under appropriate behaviors of the non-linear term, is investigated. The technical approach is based on a local minimum theorem for differentiable functionals due to Ricceri. We point out a theorem as a spe...

متن کامل

Identification of outliers types in multivariate time series using genetic algorithm

Multivariate time series data, often, modeled using vector autoregressive moving average (VARMA) model. But presence of outliers can violates the stationary assumption and may lead to wrong modeling, biased estimation of parameters and inaccurate prediction. Thus, detection of these points and how to deal properly with them, especially in relation to modeling and parameter estimation of VARMA m...

متن کامل

On the foundations of key exchange

Key exchange protocols allow two parties to agree on a shared secret over an untrusted channel. A huge number of scientific works on key exchange have been published since the discovery of the first key exchange protocol, designed in 1976 by Diffie and Hellman [DH76]. The most prominent of these works is the game-based security model by Bellare and Rogaway [BR93], published in 1993 and, today, ...

متن کامل

A small improvement in the gaps between consecutive zeros of the Riemann zeta-function

Feng and Wu introduced a new general coefficient sequence into Montgomery and Odlyzko’s method for exhibiting irregularity in the gaps between consecutive zeros of ζ (s) assuming the Riemann hypothesis. They used a special case of their sequence to improve upon earlier results on the gaps. In this paper we consider a general sequence related to that of Feng and Wu, and introduce a somewhat less...

متن کامل

On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings

Statistical Zero-knowledge proofs (Goldwasser, Micali and Rackoff, SICOMP 1989) allow a computationally unbounded server to convince a computationally limited client that an input x is in a language Π without revealing any additional information about x that the client cannot compute by herself. Randomized encoding (RE) of functions (Ishai and Kushilevitz, FOCS 2000) allows a computationally li...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2007