Lattice-Based Identification Schemes Secure Under Active Attacks

From MaRDI portal
Publication:5445452

DOI10.1007/978-3-540-78440-1_10zbMath1162.94388OpenAlexW2163469693MaRDI QIDQ5445452

Vadim Lyubashevsky

Publication date: 5 March 2008

Published in: Public Key Cryptography – PKC 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_10




Related Items (37)

Lattice-based key exchange on small integer solution problemUntraceability of Partial Blind and Blind Signature SchemesDoes Fiat-Shamir require a cryptographic hash function?A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesTightly secure signatures from lossy identification schemesOn ideal lattices, Gröbner bases and generalized hash functionsPractical non-interactive publicly verifiable secret sharing with thousands of partiesToward non-interactive zero-knowledge proofs for NP from LWESampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyAsymptotically efficient lattice-based digital signaturesKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeLattice-based accumulator with constant time list update and constant time verificationZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsA lightweight identification protocol based on latticesThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsPractical exact proofs from lattices: new techniques to exploit fully-splitting ringsLattice-based e-cash, revisitedSecret handshakes: full dynamicity, deniability and lattice-based designZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionReduced Gröbner bases and Macaulay-Buchberger basis theorem over Noetherian ringsAnalysis of Error Terms of Signatures Based on Learning with ErrorsA lattice-based group signature scheme with verifier-local revocationImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsSecurity analysis of cryptosystems using short generators over ideal latticesAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackImproved Zero-Knowledge Identification with LatticesCryptographic Functions from Worst-Case Complexity AssumptionsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsRigorous and Efficient Short Lattice Vectors EnumerationImproved attacks on knapsack problem with their variants and a knapsack type ID-schemeAchievable upper bound for the sup-norm of the product of elements of the ring of truncated polynomials and its application to the analysis of NTRU-like cryptosystemsThe Geometry of Lattice CryptographyHow to Prove Knowledge of Small SecretsAlgebraic lattices via polynomial ringsSurvey of Lattice-Based Group Signature


Uses Software


Cites Work


This page was built for publication: Lattice-Based Identification Schemes Secure Under Active Attacks