Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428126

DOI10.1007/b11817zbMath1122.68448OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428126

Daniele Micciancio, Salil P. Vadhan

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (31)

Lattice-based key exchange on small integer solution problemThe inapproximability of lattice and coding problems with preprocessingLattice-based zero-knowledge arguments for additive and multiplicative relationsOn basing search SIVP on \(\mathbf{NP}\)-hardnessA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesTightly secure signatures from lossy identification schemesZero-Knowledge Interactive Proof Systems for New Lattice ProblemsToward non-interactive zero-knowledge proofs for NP from LWEOn the complexity of collision resistant hash functions: new and old black-box separationsA Novel Certificateless Multi-signature Scheme over NTRU LatticesA novel identity-based multi-signature scheme over NTRU latticesZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionLattice-based inner product argumentZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionAdaptive zero-knowledge proofs and adaptively secure oblivious transferSZK proofs for black-box group problemsZero-Knowledge Proofs of ProximityStructure Versus Hardness Through the Obfuscation LensA framework for non-interactive instance-dependent commitment schemes (NIC)A lattice-based group signature scheme with verifier-local revocationImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsGenerating shorter bases for hard random latticesCryptographic Functions from Worst-Case Complexity AssumptionsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsUnnamed ItemLattice-Based Identification Schemes Secure Under Active AttacksAn Equivalence Between Zero Knowledge and CommitmentsThe Complexity of Zero KnowledgeLearning a parallelepiped: Cryptanalysis of GGH and NTRU signatures(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesPublic-coin statistical zero-knowledge batch verification against malicious verifiers


Uses Software



This page was built for publication: Advances in Cryptology - CRYPTO 2003