next up previous
Next: On the Power of Up: The Post-Doctoral Period (1983-86) Previous: RSA/Rabin Functions: Certain Parts

On the Cryptographic Applications of Random Functions

It is shown that secure private-key encryption and message-authentication schemes can be constructed using a collection of pseudorandom functions. In both cases, security is with respect to adaptive chosen ciphertext (or document) attacks.


Comments: Authored by O. Goldreich, S. Goldwasser and S. Micali. Appeared in



Oded Goldreich
2003-07-30