A lightweight identification protocol based on lattices
From MaRDI portal
Publication:6091129
DOI10.1007/978-3-031-31368-4_4zbMath1527.94036OpenAlexW4367663747MaRDI QIDQ6091129
Patrick Struck, Samed Düzlü, Thomas Pöppelmann, Juliane Krämer
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_4
Cites Work
- Unnamed Item
- Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- Online-extractability in the quantum random-oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto
- Masking Dilithium. Efficient implementation and side-channel evaluation
- Quantum security proofs using semi-classical oracles
- SQISign: compact post-quantum signatures from quaternions and isogenies
- An efficient statistical zero-knowledge authentication protocol for smart cards
- Lattice Signatures and Bimodal Gaussians
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications
- Tightly-Secure Signatures from Lossy Identification Schemes
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Efficient Authentication from Hard Learning Problems
- Identification Schemes from Key Encapsulation Mechanisms
- Random Oracles in a Quantum World
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Trapdoors for hard lattices and new cryptographic constructions
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A new identification scheme based on syndrome decoding
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- Secure integration of asymmetric and symmetric encryption schemes
- CSIDH on the Surface
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
- Lattice-Based Identification Schemes Secure Under Active Attacks
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: A lightweight identification protocol based on lattices