• DocumentCode
    937331
  • Title

    Relativized cryptography

  • Author

    Brassard, Gilles

  • Volume
    29
  • Issue
    6
  • fYear
    1983
  • fDate
    11/1/1983 12:00:00 AM
  • Firstpage
    877
  • Lastpage
    894
  • Abstract
    It appears to be very difficult to give a formal definition of computational security for public-key cryptography. A slightly different notion, called transient-key cryptography, is defined for which a natural definition of security against chosen-plaintext attacks is given. The main result presented here is the existence of a relativized model of computation under which there does exist a secure transient-key cryptosystem. Indeed, there exists a computable oracle that can be used by cryptographers to efficiently encipher and decipher messages, yet it is of no help to the cryptanalyst trying to decode messages not intended for him. As a corollary, there also exists a length-preserving permutation, the inverse of which is hard to compute on most elements of its domain, even if arbitrary evaluations of the function itself are allowed for free.
  • Keywords
    Cryptography; Art; Computational complexity; Computational modeling; Computer security; Decoding; Guidelines; Information security; Information theory; NIST; Public key cryptography;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.1983.1056754
  • Filename
    1056754