1980
DOI: 10.1007/3-540-10003-2_71
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocomplexity and NP-completeness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

1980
1980
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…6 Even, Yacobi and Lempel [22,51] devised a public key cryptosystem such that an efficient adversary that breaks the system for every key implies an efficient algorithm for an NP-complete problem. An efficient adversary that breaks the system on almost all keys, however, is also discussed.…”
Section: One-way Functions and Cryptographymentioning
confidence: 99%
“…6 Even, Yacobi and Lempel [22,51] devised a public key cryptosystem such that an efficient adversary that breaks the system for every key implies an efficient algorithm for an NP-complete problem. An efficient adversary that breaks the system on almost all keys, however, is also discussed.…”
Section: One-way Functions and Cryptographymentioning
confidence: 99%
“…Contract signing [1] is an important security task with many applications, namely to stock market and others [2]. It is a two party protocol between Alice and Bob who share a common contract and want to exchange each others' commitments to it, thus binding to the terms of the contract.…”
Section: Introductionmentioning
confidence: 99%
“…However, Trent's time and resources are expensive and should be avoided as much as possible. Unfortunately, it has been shown that there is no fair and viable contract signing protocol [1,3], unless during the signature exchange phase the signing parties communicate with a common trusted agent, i.e., Trent. By fair protocol we mean that either both parties get each other's commitment or none gets.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptosystems reliant on N P-complete problems [22] have been previously studied, e.g., the Merkle-Hellman cryptosystem [36], which is based on the general knapsack problem. These systems rely on a series of tricks to conceal the existence of a "trapdoor" that permits retrieving the hidden information efficiently (N DBs have no trapdoors); however, almost all knapsack cryptosystems have been broken [40].…”
Section: Related Workmentioning
confidence: 99%