TY - JOUR
T1 - Enhancements of trapdoor permutations
AU - Goldreich, Oded
AU - Rothblum, Ron D.
N1 - Israel Science Foundation [1041/08]We thank Eike Kiltz and the anonymous reviewers for their helpful comments. In particular, we would like to thank an anonymous reviewer for suggesting to consider enhancements of 1-1 TDF (which led to the contents of Sect. 7). This research was partially supported by the Israel Science Foundation (grant No. 1041/08).
PY - 2013/7
Y1 - 2013/7
N2 - We take a closer look at several enhancements of the notion of trapdoor permutations. Specifically, we consider the notions of enhanced trapdoor permutation (Goldreich, Foundation of Cryptography: Basic Applications, 2004) and doubly enhanced trapdoor permutation (Goldreich, Computational Complexity: A Conceptual Perspective, 2011) as well as intermediate notions (Rothblum, A Taxonomy of Enhanced Trapdoor Permutations, 2010). These enhancements arose in the study of Oblivious Transfer and NIZK, but they address natural concerns that may arise also in other applications of trapdoor permutations. We clarify why these enhancements are needed in such applications, and show that they actually suffice for these needs.
AB - We take a closer look at several enhancements of the notion of trapdoor permutations. Specifically, we consider the notions of enhanced trapdoor permutation (Goldreich, Foundation of Cryptography: Basic Applications, 2004) and doubly enhanced trapdoor permutation (Goldreich, Computational Complexity: A Conceptual Perspective, 2011) as well as intermediate notions (Rothblum, A Taxonomy of Enhanced Trapdoor Permutations, 2010). These enhancements arose in the study of Oblivious Transfer and NIZK, but they address natural concerns that may arise also in other applications of trapdoor permutations. We clarify why these enhancements are needed in such applications, and show that they actually suffice for these needs.
KW - Non-interactive zero-knowledge
KW - Oblivious transfer
KW - Trapdoor permutations
UR - http://www.scopus.com/inward/record.url?scp=84878971367&partnerID=8YFLogxK
U2 - https://doi.org/10.1007/s00145-012-9131-8
DO - https://doi.org/10.1007/s00145-012-9131-8
M3 - مقالة
SN - 0933-2790
VL - 26
SP - 484
EP - 512
JO - Journal of Cryptology
JF - Journal of Cryptology
IS - 3
ER -