Back to Search
Start Over
Cryptographic Assumptions: A Position Paper
- Source :
- Theory of Cryptography ISBN: 9783662490952, TCC (A1)
- Publication Year :
- 2015
- Publisher :
- Springer Berlin Heidelberg, 2015.
-
Abstract
- The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoever and no basis for evaluation and comparison. As most security proofs necessarily come in the form of a reduction between the security claim and an intractability assumption, such proofs are ultimately only as good as the assumptions they are based on. Thus, the complexity implications of every assumption we utilize should be of significant substance, and serve as the yard stick for the value of our proposals. Lately, the field of cryptography has seen a sharp increase in the number of new assumptions that are often complex to define and difficult to interpret. At times, these assumptions are hard to untangle from the constructions which utilize them. We believe that the lack of standards of what is accepted as a reasonable cryptographic assumption can be harmful to the credibility of our field. Therefore, there is a great need for measures according to which we classify and compare assumptions, as to which are safe and which are not. In this paper, we propose such a classification and review recently suggested assumptions in this light. This follows the footsteps of Naor Crypto 2003. Our governing principle is relying on hardness assumptions that are independent of the cryptographic constructions.
- Subjects :
- Cryptographic primitive
Theoretical computer science
business.industry
Cryptography
0102 computer and information sciences
02 engineering and technology
Cryptographic protocol
Computer security
computer.software_genre
Mathematical proof
01 natural sciences
Computational hardness assumption
Field (computer science)
Random oracle
010201 computation theory & mathematics
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
Security of cryptographic hash functions
business
computer
Mathematics
Subjects
Details
- ISBN :
- 978-3-662-49095-2
- ISBNs :
- 9783662490952
- Database :
- OpenAIRE
- Journal :
- Theory of Cryptography ISBN: 9783662490952, TCC (A1)
- Accession number :
- edsair.doi...........4d72a9e34c56323f5543a7891dacb664