Next: On the Power of
Up: The Post-Doctoral Period (1983-86)
Previous: RSA/Rabin Functions: Certain Parts
It is shown that secure private-key encryption and
message-authentication schemes can be constructed using a
collection of pseudorandom functions. In both cases, security is
with respect to adaptive chosen ciphertext (or document) attacks.
Comments:
Authored by O. Goldreich, S. Goldwasser and S. Micali. Appeared in
- Crypto84 (Proceedings),
Lecture Note in Computer Science (196) Springer Verlag,
pp. 276-288, 1985.
Oded Goldreich
2003-07-30