메뉴 건너뛰기




Volumn 4939 LNCS, Issue , 2008, Pages 162-179

Lattice-based identification schemes secure under active attacks

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTER NETWORKS; COMPUTER PRIVACY; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; HARDNESS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; QUANTUM COMPUTERS; STANDARDS;

EID: 40249086645     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78440-1_10     Document Type: Conference Paper
Times cited : (122)

References (30)
  • 1
    • 0029719917 scopus 로고    scopus 로고
    • Generating hard instances of lattice problems
    • Ajtai, M.: Generating hard instances of lattice problems. In: STOC, pp. 99-108 (1996)
    • (1996) STOC , pp. 99-108
    • Ajtai, M.1
  • 2
    • 0031644084 scopus 로고    scopus 로고
    • 2 is NP-hard for randomized reductions
    • 2 is NP-hard for randomized reductions. In: STOC, pp. 10-19 (1998)
    • (1998) STOC , pp. 10-19
    • Ajtai, M.1
  • 3
    • 0030679849 scopus 로고    scopus 로고
    • Ajtai, M., Dwork, C.: A. public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284-293 (1997)
    • Ajtai, M., Dwork, C.: A. public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284-293 (1997)
  • 4
    • 0034826416 scopus 로고    scopus 로고
    • Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem, In: STOC, pp. 601-610 (2001)
    • Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem, In: STOC, pp. 601-610 (2001)
  • 5
    • 38149019948 scopus 로고    scopus 로고
    • Sampling methods for shortest vectors, closest vectors and successive minima
    • Arge, L, Cachin, C, Jurdziński, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
    • Blömer, J., Naewe, S.: Sampling methods for shortest vectors, closest vectors and successive minima. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 65-77. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4596 , pp. 65-77
    • Blömer, J.1    Naewe, S.2
  • 6
    • 0032653013 scopus 로고    scopus 로고
    • On the complexity of computing short linearly independent vectors and short bases in a lattice
    • Blömer, J., Seifert, J.-P.: On the complexity of computing short linearly independent vectors and short bases in a lattice. In: STOC, pp. 711-720 (1999)
    • (1999) STOC , pp. 711-720
    • Blömer, J.1    Seifert, J.-P.2
  • 7
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptology 1(2), 77-94 (1988)
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 8
    • 0024984004 scopus 로고
    • Witness indistinguishable and witness hiding protocols
    • Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
    • (1990) STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 33749561582 scopus 로고    scopus 로고
    • On the fly authentication and signature schemes based on groups of unknown order
    • Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. Cryptology 19(4), 463-487 (2006)
    • (2006) J. Cryptology , vol.19 , Issue.4 , pp. 463-487
    • Girault, M.1    Poupard, G.2    Stern, J.3
  • 11
    • 84947558992 scopus 로고
    • A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
    • Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
    • Guillou, L., Quisquater, J.J.: A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 216-231
    • Guillou, L.1    Quisquater, J.J.2
  • 12
    • 0024771884 scopus 로고
    • How to recycle random bits
    • Impagliazzo, R., Zuckerman, D.: How to recycle random bits. In: FOCS, pp. 248-253 (1989)
    • (1989) FOCS , pp. 248-253
    • Impagliazzo, R.1    Zuckerman, D.2
  • 13
    • 17744386194 scopus 로고    scopus 로고
    • Hardness of approximating the shortest vector problem in lattices
    • Khot, S.: Hardness of approximating the shortest vector problem in lattices. In: FOCS, pp. 126-135 (2004)
    • (2004) FOCS , pp. 126-135
    • Khot, S.1
  • 14
    • 0041384096 scopus 로고    scopus 로고
    • On polynomial-factor approximations to the shortest lattice vector length
    • Kumar, R., Sivakumar, D.: On polynomial-factor approximations to the shortest lattice vector length. SIAM J. Discrete Math. 16(3), 422-425 (2003)
    • (2003) SIAM J. Discrete Math , vol.16 , Issue.3 , pp. 422-425
    • Kumar, R.1    Sivakumar, D.2
  • 15
    • 33746342484 scopus 로고    scopus 로고
    • Generalized compact knapsacks are collision resistant
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 144-155
    • Lyubashevsky, V.1    Micciancio, D.2
  • 17
    • 40249107880 scopus 로고    scopus 로고
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In: Computational Complexity (2002); Preliminary version in FOCS 2002 (to appear)
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In: Computational Complexity (2002); Preliminary version in FOCS 2002 (to appear)
  • 18
    • 51949098877 scopus 로고    scopus 로고
    • Micciancio, D.: Efficient reductions among lattice problems. In: SODA (to appear, 2008)
    • Micciancio, D.: Efficient reductions among lattice problems. In: SODA (to appear, 2008)
  • 19
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on Gaussian measures
    • Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. on Computing 37(1), 267-302 (2007)
    • (2007) SIAM J. on Computing , vol.37 , Issue.1 , pp. 267-302
    • Micciancio, D.1    Regev, O.2
  • 20
    • 35248837045 scopus 로고    scopus 로고
    • Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Micciancio, D., Vadhan, S.: Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 282-298. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 282-298
    • Micciancio, D.1    Vadhan, S.2
  • 21
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 22
    • 40249117855 scopus 로고    scopus 로고
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, Springer, Heidelberg (2006)
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, Springer, Heidelberg (2006)
  • 23
    • 84957794940 scopus 로고    scopus 로고
    • The composite discrete logarithm and secure authentication
    • Pointcheval, D.: The composite discrete logarithm and secure authentication, In: Public Key Cryptography, pp. 113-128 (2000)
    • (2000) Public Key Cryptography , pp. 113-128
    • Pointcheval, D.1
  • 24
    • 0037770045 scopus 로고    scopus 로고
    • New lattice based cryptographic constructions
    • Regev, O.: New lattice based cryptographic constructions. In: STOC, pp. 407-416 (2003)
    • (2003) STOC , pp. 407-416
    • Regev, O.1
  • 26
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161-174 (1991)
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 27
    • 85032871579 scopus 로고
    • An efficient identification scheme based on permuted kernels (extended abstract)
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Shamir, A.: An efficient identification scheme based on permuted kernels (extended abstract). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 606-609. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 606-609
    • Shamir, A.1
  • 28
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
    • (1997) SIAM J. Comput , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.1
  • 29
    • 0004746654 scopus 로고    scopus 로고
    • On the security of a practical identification scheme
    • Shoup, V.: On the security of a practical identification scheme. J. Cryptology 12(4), 247-260 (1999)
    • (1999) J. Cryptology , vol.12 , Issue.4 , pp. 247-260
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.