메뉴 건너뛰기




Volumn 4948 LNCS, Issue , 2008, Pages 37-54

Asymptotically efficient lattice-based digital signatures

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ALGORITHMS; APPROXIMATION THEORY; ASYMPTOTIC ANALYSIS; AUTHENTICATION; CRYPTOGRAPHY; DIGITAL ARITHMETIC; EVOLUTIONARY ALGORITHMS; VECTORS;

EID: 40249114814     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78524-8_3     Document Type: Conference Paper
Times cited : (136)

References (29)
  • 1
    • 27344461174 scopus 로고    scopus 로고
    • Lattice problems in NP ∩ coNP
    • Aharonov, D., Regev, O.: Lattice problems in NP ∩ coNP. Journal of the ACM 52(5), 749-765 (2005)
    • (2005) Journal of the ACM , vol.52 , Issue.5 , pp. 749-765
    • Aharonov, D.1    Regev, O.2
  • 2
    • 40249083658 scopus 로고    scopus 로고
    • Ajtai, M.: Generating hard instances of lattice problems. Complexity of Computations and Proofs, Quaderni di Matematica 13, 1-32 (2004) (Preliminary version in STOC 1996)
    • Ajtai, M.: Generating hard instances of lattice problems. Complexity of Computations and Proofs, Quaderni di Matematica 13, 1-32 (2004) (Preliminary version in STOC 1996)
  • 3
    • 0034826416 scopus 로고    scopus 로고
    • A sieve algorithm for the shortest lattice vector problem
    • Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: STOC, pp. 601-610 (2001)
    • (2001) STOC , pp. 601-610
    • Ajtai, M.1    Kumar, R.2    Sivakumar, D.3
  • 4
    • 84955557264 scopus 로고    scopus 로고
    • Bleichenbacher, D., Maurer, U.: On the efficiency of one-time digital signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 145-158. Springer, Heidelberg (1996)
    • Bleichenbacher, D., Maurer, U.: On the efficiency of one-time digital signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 145-158. Springer, Heidelberg (1996)
  • 5
    • 84948125649 scopus 로고    scopus 로고
    • Optimal tree-based one-time digital signature schemes
    • Puech, C, Reischuk, R, eds, STAGS 1996, Springer, Heidelberg
    • Bleichenbacher, D., Maurer, U.: Optimal tree-based one-time digital signature schemes. In: Puech, C., Reischuk, R. (eds.) STAGS 1996. LNCS, vol. 1046, pp. 363-374. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1046 , pp. 363-374
    • Bleichenbacher, D.1    Maurer, U.2
  • 6
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13(4), 850-864 (1984)
    • (1984) SIAM J. Comput , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 85028742531 scopus 로고    scopus 로고
    • Provably unfbrgeable signatures
    • McCurley, K.S, Ziegler, CD, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
    • Bos, J., Chaum, D.: Provably unfbrgeable signatures. In: McCurley, K.S., Ziegler, CD. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol. 1440, pp. 1-14. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1440 , pp. 1-14
    • Bos, J.1    Chaum, D.2
  • 8
    • 85024261619 scopus 로고    scopus 로고
    • Signature schemes based on the strong RSA assumption
    • Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. ACM Trans. Inf. Syst. Secur. 3(3), 161-185 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.3 , pp. 161-185
    • Cramer, R.1    Shoup, V.2
  • 10
    • 0037125666 scopus 로고    scopus 로고
    • Approximating SVP∞ to within almost-polynomial factors is NP-hard
    • Dinur, I.: Approximating SVP∞ to within almost-polynomial factors is NP-hard. Theor. Comput. Sci. 285(1), 55-71 (2002)
    • (2002) Theor. Comput. Sci , vol.285 , Issue.1 , pp. 55-71
    • Dinur, I.1
  • 11
    • 0003157491 scopus 로고    scopus 로고
    • On-line/off-line digital signatures
    • Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptology 9(1), 35-67 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.1 , pp. 35-67
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 12
    • 33644600483 scopus 로고    scopus 로고
    • Bounds on the efficiency of generic cryptographic constructions
    • Gennaro, R., Gertner, Y., Katz, J., Trevisan, L.: Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing 35(1), 217-246 (2005)
    • (2005) SIAM Journal on Computing , vol.35 , Issue.1 , pp. 217-246
    • Gennaro, R.1    Gertner, Y.2    Katz, J.3    Trevisan, L.4
  • 13
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signatures without the random oracle
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 14
    • 0034205405 scopus 로고    scopus 로고
    • On the limits of nonapproximability of lattice problems
    • Goldreich, O., Goldwasser, S.: On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci. 60(3) (2000)
    • (2000) J. Comput. Syst. Sci , vol.60 , Issue.3
    • Goldreich, O.1    Goldwasser, S.2
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 16
    • 84958749510 scopus 로고    scopus 로고
    • The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Hevia, A., Micciancio, D.: The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 379-396. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 379-396
    • Hevia, A.1    Micciancio, D.2
  • 17
    • 0041384096 scopus 로고    scopus 로고
    • On polynomial-factor approximations to the shortest lattice vector length
    • Kumar, R., Sivakumar, D.: On polynomial-factor approximations to the shortest lattice vector length. SIAM J. Discrete Math. 16(3), 422-425 (2003)
    • (2003) SIAM J. Discrete Math , vol.16 , Issue.3 , pp. 422-425
    • Kumar, R.1    Sivakumar, D.2
  • 18
    • 33746342484 scopus 로고    scopus 로고
    • Generalized compact knapsacks are collision resistant
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 144-155
    • Lyubashevsky, V.1    Micciancio, D.2
  • 19
    • 40249087766 scopus 로고    scopus 로고
    • Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, R.: Provably secure FFT hashing. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
    • Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, R.: Provably secure FFT hashing. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
  • 20
    • 84958802026 scopus 로고    scopus 로고
    • A digital signature based on a conventional encryption function
    • McCurley, K.S, Ziegler, CD, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
    • Merkle, R.: A digital signature based on a conventional encryption function. In: McCurley, K.S., Ziegler, CD. (eds.) Advances in Cryptology 1981. - 1997. LNCS, vol. 1440, pp. 369-378. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1440 , pp. 369-378
    • Merkle, R.1
  • 21
    • 84969346266 scopus 로고    scopus 로고
    • A certified digital signature
    • McCurley, K.S, Ziegler, C.D, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
    • Merkle, R.: A certified digital signature. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol. 1440, pp. 218-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1440 , pp. 218-238
    • Merkle, R.1
  • 22
    • 38749089099 scopus 로고    scopus 로고
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity (2007) (Special issue on worst-case versus average-case complexity, in print. Available on-line as doi:10.1007/s00037-007-0234-9. Preliminary version in FOCS 2002)
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity (2007) (Special issue on worst-case versus average-case complexity, in print. Available on-line as doi:10.1007/s00037-007-0234-9. Preliminary version in FOCS 2002)
  • 23
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC, pp. 33-43 (1989)
    • (1989) STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 24
    • 0008284565 scopus 로고    scopus 로고
    • Fail-stop signatures
    • Pedersen, T., Pfitzmann, B.: Fail-stop signatures. SIAM J. Comput. 26(2), 291-330 (1997)
    • (1997) SIAM J. Comput , vol.26 , Issue.2 , pp. 291-330
    • Pedersen, T.1    Pfitzmann, B.2
  • 25
    • 40249117848 scopus 로고    scopus 로고
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, Springer, Heidelberg (2006)
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, Springer, Heidelberg (2006)
  • 27
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: STOC, pp. 387-394 (1990)
    • (1990) STOC , pp. 387-394
    • Rompel, J.1
  • 28
    • 35048813651 scopus 로고    scopus 로고
    • Merkle tree traversal in log space and time
    • Cachiri, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Szydlo, M.: Merkle tree traversal in log space and time. In: Cachiri, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541-554. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 541-554
    • Szydlo, M.1
  • 29
    • 0011039877 scopus 로고
    • Another NP-compIete problem and the complexity of computing short vectors in a lattice
    • Technical Report 81.-04, University of Amsterdam
    • van Emde Boas, P.: Another NP-compIete problem and the complexity of computing short vectors in a lattice. Technical Report 81.-04, University of Amsterdam (1981), http://turing.wins.uva.nl/~peter/
    • (1981)
    • van Emde Boas, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.