International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Fine-Grained Cryptography Revisited

Authors:
Shohei Egashira
Yuyu Wang
Keisuke Tanaka
Download:
DOI: 10.1007/s00145-021-09390-3
Search ePrint
Search Google
Abstract: Fine-grained cryptographic primitives are secure against adversaries with bounded resources and can be computed by honest users with less resources than the adversaries. In this paper, we revisit the results by Degwekar, Vaikuntanathan, and Vasudevan in Crypto 2016 on fine-grained cryptography and show constructions of three key fundamental fine-grained cryptographic primitives: one-way permutation families , hash proof systems (which in turn implies a public-key encryption scheme against chosen chiphertext attacks ), and trapdoor one-way functions . All of our constructions are computable in $$\textsf {NC}^1$$ NC 1 and secure against ( non-uniform ) $$\textsf {NC}^1$$ NC 1 circuits under the widely believed worst-case assumption $$\textsf {NC}^1\subsetneq {\oplus \textsf {L/poly}}$$ NC 1 ⊊ ⊕ L / poly .
BibTeX
@article{jofc-2021-31770,
  title={Fine-Grained Cryptography Revisited},
  journal={Journal of Cryptology},
  publisher={Springer},
  volume={34},
  doi={10.1007/s00145-021-09390-3},
  author={Shohei Egashira and Yuyu Wang and Keisuke Tanaka},
  year=2021
}