The paper "Polynomial Reconstruction Based Cryptography (A Short Survey)" by Aggelos Kiayias and Moti Yung explores the cryptographic applications of the Polynomial Reconstruction (PR) problem, which is closely related to the decoding of Reed-Solomon codes. The PR problem involves finding all polynomials of degree less than \( k \) that fit at least \( t \) out of \( n \) given points over a finite field. The paper highlights the following key points:
1. **Background and Solvability**: The PR problem is well-studied, with efficient solutions when \( t \geq \frac{n + k}{2} \). For smaller values of \( t \), the problem is harder, especially when \( t < \sqrt{kn} \).
2. **Cryptographic Applications**: The "Oblivious Polynomial Evaluation" (OPE) primitive, introduced by Naor and Pinkas, leverages the PR problem to secure the evaluation of a univariate polynomial between two parties. This primitive has been used in various cryptographic protocols, including password authentication and secure list intersection computation.
3. **Structural Investigation**: Kiayias and Yung investigate the cryptographic hardness properties of PR, identifying a related subproblem called the Index-PR-Assumption (IPR). They show that PR instances are pseudorandom and can be used to construct semantically secure encryption and pseudorandom functions.
4. **Multisample Polynomial Reconstruction (MPR)**: The MPR problem generalizes PR by involving multiple instances with the same index set. It is believed to be hard when the number of instances \( r \) is smaller than \( n/t \). MPR shares robustness properties with PR and is sensitive to partial information extraction.
5. **Cryptographic Protocols**: The paper introduces a family of two-player games based on MPR, leading to novel cryptographic protocols such as a deterministically correct, polylogarithmic Private Information Retrieval (PIR) protocol, secure computation of the List's Intersection Predicate, and protocols for settlement escrows and oblivious bargaining/negotiations.
6. **Symmetric Encryption**: The PR and MPR problems are used to develop symmetric encryption schemes with advanced attributes, including semantic security, error-correcting decryption, and double homomorphic encryption.
In conclusion, the rich algebraic structure of PR and its variants makes them valuable for cryptographic applications, providing robust primitives and novel protocols in secure computing and e-commerce.The paper "Polynomial Reconstruction Based Cryptography (A Short Survey)" by Aggelos Kiayias and Moti Yung explores the cryptographic applications of the Polynomial Reconstruction (PR) problem, which is closely related to the decoding of Reed-Solomon codes. The PR problem involves finding all polynomials of degree less than \( k \) that fit at least \( t \) out of \( n \) given points over a finite field. The paper highlights the following key points:
1. **Background and Solvability**: The PR problem is well-studied, with efficient solutions when \( t \geq \frac{n + k}{2} \). For smaller values of \( t \), the problem is harder, especially when \( t < \sqrt{kn} \).
2. **Cryptographic Applications**: The "Oblivious Polynomial Evaluation" (OPE) primitive, introduced by Naor and Pinkas, leverages the PR problem to secure the evaluation of a univariate polynomial between two parties. This primitive has been used in various cryptographic protocols, including password authentication and secure list intersection computation.
3. **Structural Investigation**: Kiayias and Yung investigate the cryptographic hardness properties of PR, identifying a related subproblem called the Index-PR-Assumption (IPR). They show that PR instances are pseudorandom and can be used to construct semantically secure encryption and pseudorandom functions.
4. **Multisample Polynomial Reconstruction (MPR)**: The MPR problem generalizes PR by involving multiple instances with the same index set. It is believed to be hard when the number of instances \( r \) is smaller than \( n/t \). MPR shares robustness properties with PR and is sensitive to partial information extraction.
5. **Cryptographic Protocols**: The paper introduces a family of two-player games based on MPR, leading to novel cryptographic protocols such as a deterministically correct, polylogarithmic Private Information Retrieval (PIR) protocol, secure computation of the List's Intersection Predicate, and protocols for settlement escrows and oblivious bargaining/negotiations.
6. **Symmetric Encryption**: The PR and MPR problems are used to develop symmetric encryption schemes with advanced attributes, including semantic security, error-correcting decryption, and double homomorphic encryption.
In conclusion, the rich algebraic structure of PR and its variants makes them valuable for cryptographic applications, providing robust primitives and novel protocols in secure computing and e-commerce.