Bonsai trees, or how to delegate a lattice basis

From MaRDI portal
Publication:1928766

DOI10.1007/s00145-011-9105-2zbMath1277.94017OpenAlexW1983370494WikidataQ59163683 ScholiaQ59163683MaRDI QIDQ1928766

Chris Peikert, Eike Kiltz, David Cash, Dennis Hofheinz

Publication date: 4 January 2013

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://ir.cwi.nl/pub/16843




Related Items (39)

Generic Constructions of Revocable Identity-Based EncryptionTargeted Homomorphic Attribute-Based EncryptionBlack-box accumulation based on latticesOn the higher-bit version of approximate inhomogeneous short integer solution problemSurvey of information securityLattice-based IBE with equality test supporting flexible authorization in the standard modelFaster Gaussian sampling for trapdoor lattices with arbitrary modulusAnonymous IBE, leakage resilience and circular security from new assumptionsDynamic collusion bounded functional encryption from identity-based encryptionCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Towards Tightly Secure Lattice Short Signature and Id-Based EncryptionJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest latticeMore efficient adaptively secure lattice-based IBE with equality test in the standard modelForward-secure encryption with fast forwardingCandidate witness encryption from lattice techniquesPost-quantum asynchronous deniable key exchange and the signal handshakePublic key authenticated encryption with keyword search from LWEA lattice-based forward secure IBE scheme for Internet of thingsAdaptively secure inner product encryption from LWEUpdatable public key encryption in the standard modelVector and functional commitments from latticesRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreEfficient identity-based encryption with hierarchical key-insulation from HIBEEfficient public-key encryption with equality test from latticesA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWESimple and generic constructions of succinct functional encryptionAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityVerifiable random functions: relations to identity-based key encapsulation and new constructionsUnbounded multi-party computation from learning with errorsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityAlgorithms for the Generalized NTRU Equations and their Storage AnalysisA new Gaussian sampling for trapdoor lattices with arbitrary modulusStrongly unforgeable ring signature scheme from lattices in the standard modelRevocable hierarchical attribute-based signatures from latticesUnnamed ItemLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceThe Complexity of Public-Key Cryptography


Uses Software


Cites Work


This page was built for publication: Bonsai trees, or how to delegate a lattice basis