We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classification of such assumptions based on the complexity of falsifying them (in case they happen not to be true) by creating a challenge (competition) to their validity. As an outcome of this classification we propose several open problems regarding cryptographic tasks that currently do not have a good challenge of that sort. The most outstanding one is the design of an efficient block ciphers. © International Association for Cryptologic Research 2003.
CITATION STYLE
Naor, M. (2003). On cryptographic assumptions and challenges. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2729, 96–109. https://doi.org/10.1007/978-3-540-45146-4_6
Mendeley helps you to discover research relevant for your work.