Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Generating Shorter Bases for Hard Random Lattices - MaRDI portal

Generating Shorter Bases for Hard Random Lattices

From MaRDI portal
Publication:5389967

DOI10.4230/LIPIcs.STACS.2009.1832zbMath1236.94049OpenAlexW1520749523MaRDI QIDQ5389967

Chris Peikert, Joël Alwen

Publication date: 24 April 2012

Full work available at URL: http://subs.emis.de/LIPIcs/frontdoor_df0c.html




Related Items

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyLattice-based linearly homomorphic signatures in the standard modelLattice-based certificateless encryption schemePolicy-based signature scheme from latticesAttribute-based access control for inner product functional encryption from LWEAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelBlack-box accumulation based on latticesLattice-based IBE with equality test supporting flexible authorization in the standard modelPuncturable identity-based and attribute-based encryption from latticesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelA novel model for lattice-based authorized searchable encryption with special keywordScalable revocable identity-based signature over lattices in the standard modelBonsai trees, or how to delegate a lattice basisSuccinct vector, polynomial, and functional commitments from latticesZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsPuncturable signature: a generic construction and instantiationsRevocable identity-based fully homomorphic signature scheme with signing key exposure resistanceIdentity-based interactive aggregate signatures from lattices\(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptographyZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionAn efficient homomorphic aggregate signature scheme based on latticeLattice-based completely non-malleable public-key encryption in the standard modelPublic key compression for constrained linear signature schemesImproved (Hierarchical) Inner-Product Encryption from LatticesWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelAdaptive oblivious transfer with access control from lattice assumptionsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEAdaptively secure MPC with sublinear communication complexityMultiparty reusable non-interactive secure computation from LWEChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionA Lattice-Based Group Signature Scheme with Message-Dependent OpeningWildcarded identity-based encryption from latticesChosen-ciphertext lattice-based public key encryption with equality test in standard modelLattice-based linearly homomorphic signature scheme over binary field