The Complexity of Public-Key Cryptography [chapter]

Boaz Barak
2017 Tutorials on the Foundations of Cryptography  
We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence we have for the veracity of these assumptions.
doi:10.1007/978-3-319-57048-8_2 fatcat:74ecqky6sraifpvfnylqxc6jom