메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 617-635

Efficient public key encryption based on ideal lattices

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTIC PERFORMANCE; BOUNDED DISTANCE DECODING; ENCRYPTION AND DECRYPTION; KEY GENERATION; LATTICE VECTORS; ONE-WAY FUNCTIONS; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; SECURITY PARAMETERS; SHORTEST VECTOR PROBLEM; TECHNICAL TOOLS; WORST CASE;

EID: 72449142727     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_36     Document Type: Conference Paper
Times cited : (225)

References (36)
  • 1
    • 0029719917 scopus 로고    scopus 로고
    • Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of STOC 1996, pp. 99-108. ACM, New York (1996)
    • Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of STOC 1996, pp. 99-108. ACM, New York (1996)
  • 2
    • 84887467921 scopus 로고    scopus 로고
    • Generating hard instances of the short basis problem
    • Wiedermann, J, Van Emde Boas, P, Nielsen, M, eds, ICALP 1999, Springer, Heidelberg
    • Ajtai, M.: Generating hard instances of the short basis problem. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 1-9. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1644 , pp. 1-9
    • Ajtai, M.1
  • 3
    • 0030679849 scopus 로고    scopus 로고
    • Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: Proceedings of STOC 1997, pp. 284-293. ACM, New York (1997)
    • Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: Proceedings of STOC 1997, pp. 284-293. ACM, New York (1997)
  • 4
    • 0034826416 scopus 로고    scopus 로고
    • Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of STOC 2001, pp. 601-610. ACM, New York (2001)
    • Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of STOC 2001, pp. 601-610. ACM, New York (2001)
  • 5
    • 72449132154 scopus 로고    scopus 로고
    • Generating shorter bases for hard random lattices
    • STACS, Springer, Heidelberg
    • Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS 2009. LNCS. Springer, Heidelberg (2009)
    • (2009) LNCS
    • Alwen, J.1    Peikert, C.2
  • 6
    • 51249173801 scopus 로고
    • On Lovász' lattice reduction and the nearest lattice point problem
    • Babai, L.: On Lovász' lattice reduction and the nearest lattice point problem. Combinatorica 6, 1-13 (1986)
    • (1986) Combinatorica , vol.6 , pp. 1-13
    • Babai, L.1
  • 7
    • 0039576102 scopus 로고    scopus 로고
    • p with prime p ≡ 3 mod 4. App. Alg. in Eng., Comm. and Comp. 4, 89-94 (1992)
    • p with prime p ≡ 3 mod 4. App. Alg. in Eng., Comm. and Comp. 4, 89-94 (1992)
  • 8
    • 84990731886 scopus 로고
    • How to prove yourself - practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself - practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 9
    • 51849137205 scopus 로고    scopus 로고
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of STOC 2008, pp. 197-206. ACM, New York (2008)
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of STOC 2008, pp. 197-206. ACM, New York (2008)
  • 10
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2001)
    • (2001) Basic Applications , vol.2
    • Goldreich, O.1
  • 11
    • 84958655849 scopus 로고    scopus 로고
    • Public-key cryptosystems from lattice reduction problems
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112-131. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 112-131
    • Goldreich, O.1    Goldwasser, S.2    Halevi, S.3
  • 12
    • 84947808606 scopus 로고    scopus 로고
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
  • 13
    • 35048816448 scopus 로고    scopus 로고
    • Complete classification of bilinear hard-core functions
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Holenstein, T., Maurer, U., Sjödin, J.: Complete classification of bilinear hard-core functions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 73-91. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 73-91
    • Holenstein, T.1    Maurer, U.2    Sjödin, J.3
  • 14
    • 58349122573 scopus 로고    scopus 로고
    • Concurrently secure identification schemes based on the worst-case hardness of lattice problems
    • Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
    • Kawachi, A., Tanaka, K., Xagawa, K.: Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 372-389. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 372-389
    • Kawachi, A.1    Tanaka, K.2    Xagawa, K.3
  • 15
    • 40249086645 scopus 로고    scopus 로고
    • Lyubashevsky, V.: Lattice-based identification schemes secure under active attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 162-179. Springer, Heidelberg (2008)
    • Lyubashevsky, V.: Lattice-based identification schemes secure under active attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 162-179. Springer, Heidelberg (2008)
  • 17
    • 33746342484 scopus 로고    scopus 로고
    • Generalized compact knapsacks are collision resistant
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 144-155
    • Lyubashevsky, V.1    Micciancio, D.2
  • 18
    • 40249114814 scopus 로고    scopus 로고
    • Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 37-54. Springer, Heidelberg (2008)
    • Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
  • 19
    • 70350336456 scopus 로고    scopus 로고
    • Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) Crypto 2009. LNCS, 5677, pp. 450-461. Springer, Heidelberg (2009)
    • Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) Crypto 2009. LNCS, vol. 5677, pp. 450-461. Springer, Heidelberg (2009)
  • 20
    • 38749089099 scopus 로고    scopus 로고
    • Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity 16(4), 365-411 (2007)
    • (2007) Computational Complexity , vol.16 , Issue.4 , pp. 365-411
    • Micciancio, D.1
  • 22
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on gaussian measures
    • Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. SIAM J. Comput. 37(1), 267-302 (2007)
    • (2007) SIAM J. Comput , vol.37 , Issue.1 , pp. 267-302
    • Micciancio, D.1    Regev, O.2
  • 24
    • 35248837045 scopus 로고    scopus 로고
    • Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Micciancio, D., Vadhan, S.: Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 282-298. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 282-298
    • Micciancio, D.1    Vadhan, S.2
  • 28
    • 70350642078 scopus 로고    scopus 로고
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of STOC 2009, pp. 333-342. ACM, New York (2009)
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of STOC 2009, pp. 333-342. ACM, New York (2009)
  • 29
    • 33745559478 scopus 로고    scopus 로고
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 145-166. Springer, Heidelberg (2006)
    • Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 145-166. Springer, Heidelberg (2006)
  • 30
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and composable oblivious transfer
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 31
    • 51849152661 scopus 로고    scopus 로고
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Proceedings of STOC 2008, pp. 187-196. ACM, New York (2008)
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Proceedings of STOC 2008, pp. 187-196. ACM, New York (2008)
  • 32
    • 72449162355 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • May 2 2009
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Extended version of [33], May 2 (2009), http://www.cs.tau.ac.il/ ~odedr/
    • Extended version of [33]
    • Regev, O.1
  • 33
    • 33745571012 scopus 로고    scopus 로고
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of STOC 2005, pp. 84-93. ACM, New York (2005)
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of STOC 2005, pp. 84-93. ACM, New York (2005)
  • 34
    • 67650674979 scopus 로고    scopus 로고
    • Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 419-436. Springer, Heidelberg (2009)
    • Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419-436. Springer, Heidelberg (2009)
  • 35
    • 0023532388 scopus 로고
    • A hierarchy of polynomial lattice basis reduction algorithms
    • Schnorr, C.P.: A hierarchy of polynomial lattice basis reduction algorithms. Theor. Comput. Sci 53, 201-224 (1987)
    • (1987) Theor. Comput. Sci , vol.53 , pp. 201-224
    • Schnorr, C.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.