Generating shorter bases for hard random lattices

From MaRDI portal
Publication:537918

DOI10.1007/s00224-010-9278-3zbMath1217.94092OpenAlexW2130410178MaRDI QIDQ537918

Joël Alwen, Chris Peikert

Publication date: 23 May 2011

Published in: Theory of Computing Systems (Search for Journal in Brave)

Full work available at URL: https://drops.dagstuhl.de/opus/volltexte/2009/1832/




Related Items (44)

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelAttribute-Based Keyword Search from LatticesTrapdoors for Ideal Lattices with ApplicationsOn the higher-bit version of approximate inhomogeneous short integer solution problemFaster Gaussian sampling for trapdoor lattices with arbitrary modulusNaor-Yung paradigm with shared randomness and applicationsMatrix PRFs: constructions, attacks, and applications to obfuscationLattice-based secret handshakes with reusable credentialsCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Hardness of \(k\)-LWE and applications in traitor tracingMulti-key Homomorphic AuthenticatorsFiat-Shamir signatures based on module-NTRUForward-secure revocable secret handshakes from latticesSimplified server-aided revocable identity-based encryption from latticesPublic key authenticated encryption with keyword search from LWEA lattice-based forward secure IBE scheme for Internet of thingsIdentity-based key-exposure resilient cloud storage public auditing scheme from latticesLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentSimulatable verifiable random function from the LWE assumptionGroup signature from lattices preserving forward security in dynamic settingLattice-based proxy-oriented identity-based encryption with keyword search for cloud storageRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreTwo Efficient Tag-Based Encryption Schemes on LatticesCompact (Targeted Homomorphic) Inner Product Encryption from LWECompact Inner Product Encryption from LWESimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseStorage efficient algorithm for Hermite normal form using LLLIdentity-based blind signature from latticesA lattice-based group signature scheme with verifier-local revocationImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEIdentity-based proxy re-signatures from latticesAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityA Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud SharingVerifiable single-server private information retrieval from LWE with binary errorsNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsEfficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal latticesNaor-Yung Paradigm with Shared Randomness and ApplicationsSharing privacy protected and statistically sound clinical research data using outsourced data storageAn optimized GHV-type HE scheme: simpler, faster, and more versatileMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceGenerating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)



Cites Work


This page was built for publication: Generating shorter bases for hard random lattices