Advances in Cryptology-Crypt0’ 90
DOI: 10.1007/3-540-38424-3_31
|View full text |Cite
|
Sign up to set email alerts
|

On the Impossibility of Private Key Cryptography with Weakly Random Keys

Abstract: The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits. At the same time, however, a single source is sufficient to solve problems in the randomized complexity classes BPP and RP. It is natural to ask exactly which tasks can be done using a single, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
33
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(33 citation statements)
references
References 5 publications
0
33
0
Order By: Relevance
“…Clearly, this is the most desirable type of security-but it has its price [21], the exact determination of which has been an open problem and subject to intensive study. Most generally speaking, this price is some information-theoretic primitive [15] I, such as shared keys that are fully [20], [8], [11] or partially random [9], [18] and secret [19], authenticated and/or noisy classical [22], [6] or quantum [1] communication channels, or correlated pieces of information [13].…”
Section: Realizing Unconditional Security From Other Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Clearly, this is the most desirable type of security-but it has its price [21], the exact determination of which has been an open problem and subject to intensive study. Most generally speaking, this price is some information-theoretic primitive [15] I, such as shared keys that are fully [20], [8], [11] or partially random [9], [18] and secret [19], authenticated and/or noisy classical [22], [6] or quantum [1] communication channels, or correlated pieces of information [13].…”
Section: Realizing Unconditional Security From Other Primitivesmentioning
confidence: 99%
“…Note that we have conditioned the involved random variables on an adversary's knowledge U = u. Alternatively, our results can be interpreted as to concern the model of unconditional security from keys generated by correlated weak random sources (other examples of such results are given in [9] and [18]). …”
mentioning
confidence: 99%
“…Many works consider achieving strong cryptography given only a "weak random source" [28,16,14]. This is a source that does have high min-entropy but may not produce truly random bits.…”
Section: Introductionmentioning
confidence: 99%
“…This is a source that does have high min-entropy but may not produce truly random bits. They show that many cryptographic tasks including symmetric encryption [28], commitment, secret-sharing, and zero knowledge [16] are impossible in this setting. We are not in this setting.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation