[PDF][PDF] An unorthodox trapdoor function

A Bhowmik - International Journal of Mathematical Sciences and …, 2024 - scholar.archive.org
… by introducing a novel trapdoor function, offering a fresh … and scrutinize the proposed
trapdoor function, delving into a … Understanding the intricacies of this new trapdoor function is …

How to sign given any trapdoor function

M Bellare, S Micali - Proceedings of the twentieth annual ACM …, 1988 - dl.acm.org
… By trapdoor function we mean a permutation f hard to invert (without knowledge of the secret} …
, and the resulting signing algorithm will be more secure than the trapdoor function it uses. …

The importance of trapdoor functions

T Lecklider - EE-Evaluation Engineering, 2015 - go.gale.com
… A so-called trapdoor function typically lies at the heart of modern encryption algorithms.
Trapdoor functions are mathematical operations that are easy to perform in the forward direction …

Lossy trapdoor functions and their applications

C Peikert, B Waters - Proceedings of the fortieth annual ACM symposium …, 2008 - dl.acm.org
trapdoor function, which is a public function f that is created to behave in one of two ways.
The first way matches the usual completeness condition for an (injective) trapdoor function: …

On the lossiness of the rabin trapdoor function

Y Seurin - International Workshop on Public Key Cryptography, 2014 - Springer
… We also introduce the concept of gap one-way trapdoor function, which is informally a
trapdoor function which is hard to invert even when given access to an oracle which tells whether …

Paillier's Trapdoor Function Hides up to O(n) Bits

D Catalano, R Gennaro, N Howgrave-Graham - Journal of Cryptology, 2002 - Springer
… Another way to look at our result is that we show a candidate trapdoor function that hides up
… by giving sufficient conditions for a trapdoor function to hide super-logarithmically many bits.…

How to build a trapdoor function from an encryption scheme

S Garg, M Hajiabadi, G Malavolta… - … Conference on the Theory …, 2021 - Springer
… In this work we ask the following question: Can we transform any encryption scheme into
a trapdoor function (TDF)? Alternatively stated, can we make any encryption scheme …

A feebly secure trapdoor function

EA Hirsch, SI Nikolenko - International Computer Science Symposium in …, 2009 - Springer
… We continue Hiltgen’s work by providing an example of a feebly trapdoor function where
the adversary is guaranteed to spend more time than every honest participant by a constant …

Trapdoor hash functions and their applications

N Döttling, S Garg, Y Ishai, G Malavolta, T Mour… - Annual International …, 2019 - Springer
… Here, rate is defined as the ratio of the input length and output length for the trapdoor function.
Very recently, Garg et al. [24] obtained construction from DDH with a small constant rate. …

Adaptive trapdoor functions and chosen-ciphertext security

E Kiltz, P Mohassel, A O'Neill - … on the Theory and Applications of …, 2010 - Springer
… −1) be a trapdoor function. Let A be an inverter and define its AOW-advantage against TDF
… −1) be a trapdoor function, and let Ct be such that Ct(1k) is distributed over {0, 1}tk for a …