• DocumentCode
    2180807
  • Title

    Relativized cryptography

  • Author

    Brassard, Gilles

  • fYear
    1979
  • fDate
    29-31 Oct. 1979
  • Firstpage
    383
  • Lastpage
    391
  • Abstract
    It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly different notion, called Transient-Key Cryptography, for which a natural definition of security against chosen-plaintext-attacks can be given. The main result presented here is the existence of a relativized model of computation under which there exists a provably secure transientkey cryptosystem. Indeed, there exists a computable oracle that can be used by cryptographers to efficiently encipher and decipher messages, yet it is of no help to the cryptanalyst trying to decode messages not intended for him. As a corollary, there exists a length-preserving permutation, the inverse of which is hard to compute on most elements of its domain even if arbitrary evaluations of the function itself are allowed for free.
  • Keywords
    Art; Communication system security; Computational complexity; Computational modeling; Decoding; Delay; Distributed computing; Information security; Public key; Public key cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 1979., 20th Annual Symposium on
  • Conference_Location
    San Juan, Puerto Rico
  • ISSN
    0272-5428
  • Type

    conf

  • DOI
    10.1109/SFCS.1979.36
  • Filename
    4568033