Jan 1, 0001

Cryptography and Complexity Theory Knowledge Graph

Table of Contents

  1. Core Concepts
  2. Cryptographic Primitives
  3. Complexity Theory Foundations
  4. One-Way Functions
  5. Hard-Core Predicates
  6. Pseudorandom Generators and Variables
  7. Computational Indistinguishability
  8. One-Way Functions from Pseudorandom Generators
  9. Symmetric Key Cryptography
  10. Symmetric Key Adversaries
  11. Stream Ciphers (IND-CPA)
  12. Pseudorandom Functions
  13. Pseudorandom Permutations
  14. Block Ciphers (IND-CPA)
  15. Digital Signatures
  16. Hash Functions
  17. Lamport Digital Signature Schemes
  18. Zero-Knowledge Proofs
  19. Authentication and Bit Commitment
  20. Public Key Cryptography
  21. E-Cash Systems

1. Core Concepts

2. Cryptographic Primitives

Connections to: Symmetric Key and Public Key Cryptography

3. Complexity Theory Foundations

3.1 Basic Models

3.2 Complexity Classes

Uniform Model:

Non-uniform Model:

3.3 Algorithmic Concepts

4. One-Way Functions

5. Hard-Core Predicates

6. Pseudorandom Generators and Variables

7. Computational Indistinguishability

8. One-Way Functions from Pseudorandom Generators

9. Symmetric Key Cryptography

10. Symmetric Key Adversaries

11. Stream Ciphers (IND-CPA)

12. Pseudorandom Functions

13. Pseudorandom Permutations

14. Block Ciphers (IND-CPA)

15. Digital Signatures

16. Hash Functions

17. Lamport Digital Signature Schemes

18. Zero-Knowledge Proofs

18.1 Basic Concepts

18.2 Zero-Knowledge Variants

18.3 Examples

19. Authentication and Bit Commitment

20. Public Key Cryptography

20.1 Foundations

20.2 Number-Theoretic Problems

20.3 Security Models

20.4 Cryptosystems

21. E-Cash Systems

Connections and Dependencies

Major Theorems and Results:

  1. Yao’s Theorems: Connect one-way functions, pseudorandom generators, and computational indistinguishability
  2. Goldreich-Levin Theorem: Connects hard-core predicates to one-way functions
  3. Naor-Yung Theorem: Relates to hash functions and digital signatures
  4. Luby-Rackoff Theorem: Connects pseudorandom functions to pseudorandom permutations via Feistel networks
  5. Rompel Theorem: Foundations for Lamport digital signature schemes
  6. Shamir Theorem: IP = PSPACE result in complexity theory
  7. Hastad et al. Theorem: Pseudorandom generators from one-way permutations

Cryptographic Hierarchy:

  • Foundation: Complexity theory classes and Turing machine models
  • Core Primitives: One-way functions, hash functions
  • Building Blocks: Pseudorandom generators, functions, permutations
  • Applications: Symmetric encryption, digital signatures, zero-knowledge proofs, e-cash
  • Security Models: Various adversary models (CPA, CMA, KOA)

Key Relationships:

  1. One-way functions → Pseudorandom generators → Pseudorandom functions
  2. Hash functions → Digital signatures (via Lamport schemes)
  3. Pseudorandom permutations → Block ciphers → IND-CPA security
  4. Interactive proofs → Zero-knowledge proofs → Authentication protocols
  5. Public key primitives → Digital signatures and encryption schemes