Non-Black-Box Techniques In Crytpography Thesis for the Ph.D degree

نویسنده

  • Boaz Barak
چکیده

f(x) def = x + 1 for any integer x. Given a program Π and a value x, it is possible to compute f(x), where f(·) is the function associated with the program Π, by executing the program Π on a computer. We sometimes call the string Π the representation or code of the function f(·). Since a program is a string, it sometimes makes sense to use it as input to a different program. Indeed, algorithms that take other programs as input are very common in Computer Science. In most cases, these algorithms use their input program as a subroutine. By this we mean that, on input a program Π, the algorithm’s operation does not depend on the particular representation of the program Π, but rather, the algorithm only uses its input program Π to evaluate the function that the program Π computes. That is, the algorithm only uses Π to obtain a “black box” for computing f(·), such that the algorithm can feed inputs to and receive outputs from this box. We call such an algorithm (that only uses black-box access to the program it gets as input) a black-box algorithm. As mentioned above, black-box algorithms are very popular in computer science. Many times, when trying to solve a particular task, one would write an algorithm that solves the task if it is given black-box access to programs that solve some simpler tasks, and then write programs that solve these simpler tasks. This approach is a basic paradigm of software engineering, and almost all programming languages implement mechanisms (such as function calls) to facilitate it. Black-box algorithms are also very popular in the more theoretical aspects of Computer Science. For example, when proving that a decision problem L is NP-complete, one needs to show the existence of a black-box algorithm B (where B is usually called a reduction), such that if B is given black-box access to an algorithm A that solves the problem L, then B can solve the Satisfiability problem. Such reductions also appear in cryptography. For example, consider the constructions of public key encryption schemes whose security can be reduced to the factoring problem [Rab79, BG84]. This is shown by providing a black-box algorithm B, such that if B is given black-box access to an algorithm A that compromises the security of the encryption scheme, then B can solve the factoring problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-black-box Techniques in Cryptography

The American Heritage dictionary defines the term “Black-Box” as “A device or theoretical construct with known or specified performance characteristics but unknown or unspecified constituents and means of operation.” In the context of Computer Science, to use a program as a black-box means to use only its input/output relation by executing the program on chosen inputs, without examining the act...

متن کامل

PMU-Based Matching Pursuit Method for Black-Box Modeling of Synchronous Generator

This paper presents the application of the matching pursuit method to model synchronous generator. This method is useful for online analysis. In the proposed method, the field voltage is considered as input signal, while the terminal voltage and active power of the generator are output signals. Usually, the difference equation with a second degree polynomial structure is used to estimate the co...

متن کامل

On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation

The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landmark in cryptography, breaking the previous barriers of black-box impossibility. Barak’s technique has given rise to various powerful applications and it is a key component in all known protocols with non-black-box simulation. We present the first non-black-box simulation technique that does not r...

متن کامل

Algorithms Based on LP Relaxations for Combinatorial Optimization Problems

We survey the main results presented in the author's Ph.D Thesis 12], which addresses the use of Linear Programming (LP) relaxations within exact and heuristic algorithms for the solution of some Combinatorial Optimization (CO) problems arising from real-life applications. It is well known that CO problems admit several possible Integer LP (ILP) formulations, and the corresponding LP relaxation...

متن کامل

Topics in quantum algorithms - Adiabatic Algorithm , Quantum Money , and Bomb Query Complexity

by Han-Hsuan Lin Submitted to the Department of Physics on May 22, 2015, in partial fulfillment of the requirements for the degree of Ph.D. in Physics In this thesis, I present three results on quantum algorithms and their complexity. The first one is a numerical study on the quantum adiabatic algorithm( QAA) . We tested the performance of the QAA on random instances of MAX 2-SAT on 20 qubits a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004