Making sure the algorithms that provide the privacy are based on firm foundations and mathematical assumptions
group_project
Submitted by Mohammad Mahmoody on Tue, 01/02/2018 - 8:48pm
Since the seminal work of Shannon in 1949 cryptography has been founded on unproven computational complexity. The security of cryptographic systems could fall apart if the assumptions behind their design turn out to be false. Thus, it is crucial to base the security of crypto-systems on weakest possible assumptions. A main component of finding minimal assumptions is to ``separate'' cryptographic tasks from assumptions that are weaker than those used in constructions. In light of recent developments in cryptography, the following two directions will be pursued: