Powered by OpenAIRE graph
Found an issue? Give us feedback

FGC

Fine-Grained Cryptography
Funder: European CommissionProject code: 101019547 Call for proposal: ERC-2020-ADG
Funded under: H2020 | ERC | ERC-ADG Overall Budget: 2,493,750 EURFunder Contribution: 2,493,750 EUR
Open Access mandate
Research data: No
Description

Encryption and authentication have long been the workhorse of secure systems, but with the shift towards a decentralized mode of data processing, contemporary cryptographic tools such as secure computation and homomorphic encryption are taking center stage. Unlike their “private-key” counterparts, for which efficient candidate instantiations abound, these “public-key” types of primitives rely on a remarkably narrow base of computational hardness assumptions. Developing and understanding new assumptions upon which such primitives can be based is a necessity; the Fine-Grained Cryptography project aims to do exactly that. Traditionally, cryptography has been based on problems for which there is a conjectured exponential complexity gap between the “easy” and “hard” directions; in contrast, we propose to investigate alternatives where the underlying gap is a sufficiently large polynomial. Practically speaking, fixed polynomial gaps should suffice for concrete security parameter instantiations. From a theoretical standpoint, they yield meaningful results even if P = NP -- a scenario in which most cryptography is (asymptotically) broken. While a rich “fine-grained” complexity theory of moderately hard problems has been developed in the past two decades, its consequences to cryptography remain relatively unexplored. Moderately hard problems abound, and many of them enjoy algebraic and combinatorial structure. This, combined with the existence of tools for average-case analysis, points to their promise as a new base for advanced cryptographic applications. Our initial focus will be on lower-level cryptographic primitives, such as one-way functions and public-key encryption. However, we expect our approach to also have direct impact on the feasibility and practical efficiency of higher-level cryptographic tasks, including advanced forms of encryption and even obfuscation.

Data Management Plans
Powered by OpenAIRE graph
Found an issue? Give us feedback

Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.

All Research products
arrow_drop_down
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::4d08bbd97509a7dbcf86b82f81a9edc1&type=result"></script>');
-->
</script>
For further information contact us at helpdesk@openaire.eu

No option selected
arrow_drop_down