메뉴 건너뛰기




Volumn 6558 LNCS, Issue , 2011, Pages 319-339

Better key sizes (and Attacks) for LWE-based encryption

Author keywords

basis reduction; lattice based cryptography; learning with errors

Indexed keywords

BASIS REDUCTION; CRYPTOSYSTEMS; DISTINGUISHING ATTACKS; ENCRYPTION SCHEMES; ENUMERATION ALGORITHMS; KEY SIZES; LATTICE-BASED CRYPTOGRAPHY; LEARNING WITH ERRORS; SECURITY LEVEL;

EID: 79951793525     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19074-2_21     Document Type: Conference Paper
Times cited : (542)

References (38)
  • 1
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H)IBE in the standard model
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 2
    • 38749147177 scopus 로고    scopus 로고
    • Generating hard instances of lattice problems
    • Preliminary version in STOC 1996
    • Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matemat-ica 13, 1-32 (2004); Preliminary version in STOC 1996
    • (2004) Quaderni di Matemat-ica , vol.13 , pp. 1-32
    • Ajtai, M.1
  • 3
    • 0030679849 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/average-case equivalence
    • Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average- case equivalence. In: STOC, pp. 284-293 (1997)
    • (1997) STOC , pp. 284-293
    • Ajtai, M.1    Dwork, C.2
  • 4
    • 77949306191 scopus 로고    scopus 로고
    • The first and fourth public-key cryptosystems with worst-case/average- case equivalence
    • Ajtai, M., Dwork, C.: The first and fourth public-key cryptosystems with worst-case/average-case equivalence. Electronic Colloquium on Computational Complexity (ECCC) 14(97) (2007)
    • (2007) Electronic Colloquium on Computational Complexity (ECCC) , vol.14 , Issue.97
    • Ajtai, M.1    Dwork, C.2
  • 6
    • 0344118879 scopus 로고    scopus 로고
    • More on average case vs approximation complexity
    • Alekhnovich, M.: More on average case vs approximation complexity. In: FOCS, pp. 298-307 (2003)
    • (2003) FOCS , pp. 298-307
    • Alekhnovich, M.1
  • 7
    • 70350342511 scopus 로고    scopus 로고
    • Fast cryptographic primitives and circular-secure encryption based on hard learning problems
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 8
    • 51249173801 scopus 로고
    • On Lov́asz' lattice reduction and the nearest lattice point problem
    • Preliminary version in STACS 1985
    • Babai, L.: On Lov́asz' lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13 (1986); Preliminary version in STACS 1985
    • (1986) Combinatorica , vol.6 , Issue.1 , pp. 1-13
    • Babai, L.1
  • 9
    • 0000303291 scopus 로고
    • New bounds in some transference theorems in the geometry of numbers
    • Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen 296(4), 625-635 (1993)
    • (1993) Mathematische Annalen , vol.296 , Issue.4 , pp. 625-635
    • Banaszczyk, W.1
  • 11
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and impossibility results for encryption and commitment secure under selective opening
    • Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
    • Bellare, M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 1-35
    • Bellare, M.1    Hofheinz, D.2    Yilek, S.3
  • 12
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • DOI 10.1145/792538.792543
    • Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003) (Pubitemid 43906335)
    • (2003) Journal of the ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 13
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai trees, or how to delegate a lattice basis
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 15
    • 77954651254 scopus 로고    scopus 로고
    • Lattice enumeration using extreme pruning
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Gama, N., Nguyen, P.Q., Regev, O.: Lattice enumeration using extreme pruning. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 257-278. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 257-278
    • Gama, N.1    Nguyen, P.Q.2    Regev, O.3
  • 16
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 17
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008)
    • (2008) STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 18
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A ring-based public key cryptosystem
    • Algorithmic Number Theory
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryp-tosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998) (Pubitemid 128093558)
    • (1998) Lecture Notes in Computer Science , Issue.1423 , pp. 267-288
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.H.3
  • 19
    • 0033896372 scopus 로고    scopus 로고
    • Finding the closest lattice vector when it's unusually close
    • Klein, P.N.: Finding the closest lattice vector when it's unusually close. In: SODA, pp. 937-941 (2000)
    • (2000) SODA , pp. 937-941
    • Klein, P.N.1
  • 20
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptology 14(4), 255-293 (2001) (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 21
    • 77949610972 scopus 로고    scopus 로고
    • Public-key cryptographic primitives provably as secure as subset sum
    • Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
    • Lyubashevsky, V., Palacio, A., Segev, G.: Public-key cryptographic primitives provably as secure as subset sum. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 382-400. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 382-400
    • Lyubashevsky, V.1    Palacio, A.2    Segev, G.3
  • 22
    • 77954639468 scopus 로고    scopus 로고
    • On ideal lattices and learning with errors over rings
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 1-23
    • Lyubashevsky, V.1    Peikert, C.2    Regev, O.3
  • 23
    • 38749089099 scopus 로고    scopus 로고
    • Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
    • Preliminary version in FOCS 2002
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007); Preliminary version in FOCS 2002
    • (2007) Computational Complexity , vol.16 , Issue.4 , pp. 365-411
    • Micciancio, D.1
  • 24
    • 79951786798 scopus 로고    scopus 로고
    • Duality in lattice cryptography
    • (invited talk)
    • Micciancio, D.: Duality in lattice cryptography. In: Public Key Cryptography (2010) (invited talk)
    • (2010) Public Key Cryptography
    • Micciancio, D.1
  • 25
    • 70350294927 scopus 로고    scopus 로고
    • Lattice-based cryptography
    • Springer, Heidelberg (February)
    • Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer, Heidelberg (February 2009)
    • (2009) Post Quantum Cryptography , pp. 147-191
    • Micciancio, D.1    Regev, O.2
  • 26
    • 77954710867 scopus 로고    scopus 로고
    • A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
    • Micciancio, D., Voulgaris, P.: A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. In: STOC, pp. 351-358 (2010)
    • (2010) STOC , pp. 351-358
    • Micciancio, D.1    Voulgaris, P.2
  • 27
    • 77951698499 scopus 로고    scopus 로고
    • Faster exponential time algorithms for the shortest vector problem
    • Micciancio, D., Voulgaris, P.: Faster exponential time algorithms for the shortest vector problem. In: SODA, pp. 1468-1480 (2010)
    • (2010) SODA , pp. 1468-1480
    • Micciancio, D.1    Voulgaris, P.2
  • 28
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009)
    • (2009) STOC , pp. 333-342
    • Peikert, C.1
  • 29
    • 77956996919 scopus 로고    scopus 로고
    • An efficient and parallel gaussian sampler for lattices
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Peikert, C.: An efficient and parallel gaussian sampler for lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80-97. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 80-97
    • Peikert, C.1
  • 30
    • 51849126892 scopus 로고    scopus 로고
    • A framework for efficient and com-posable oblivious transfer
    • Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and com-posable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 31
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 32
    • 20444451186 scopus 로고    scopus 로고
    • New lattice-based cryptographic constructions
    • DOI 10.1145/1039488.1039490
    • Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899-942 (2004); Preliminary version in STOC 2003 (Pubitemid 40818310)
    • (2004) Journal of the ACM , vol.51 , Issue.6 , pp. 899-942
    • Regev, O.1
  • 33
    • 70349309809 scopus 로고    scopus 로고
    • On lattices learning with errors random linear codes, and cryptography
    • Preliminary version in STOC 2005
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1-40 (2009); Preliminary version in STOC 2005
    • (2009) J. ACM , vol.56 , Issue.6 , pp. 1-40
    • Regev, O.1
  • 34
    • 78650603081 scopus 로고    scopus 로고
    • Selecting secure parameters for lattice-based cryptography
    • Report 2010/137
    • Rückert, M., Schneider, M.: Selecting secure parameters for lattice-based cryptography. Cryptology ePrint Archive, Report 2010/137 (2010), http://eprint.iacr.org/
    • (2010) Cryptology EPrint Archive
    • Rückert, M.1    Schneider, M.2
  • 35
    • 35248874386 scopus 로고    scopus 로고
    • Lattice reduction by random sampling and birthday methods
    • Alt, H., Habib, M. (eds.) STACS 2003 Springer, Heidelberg
    • Schnorr, C.-P.: Lattice reduction by random sampling and birthday methods. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 145-156. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2607 , pp. 145-156
    • Schnorr, C.-P.1
  • 36
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problems
    • Schnorr, C.-P., Euchner, M.: Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathmatical Programming 66, 181-199 (1994)
    • (1994) Mathmatical Programming , vol.66 , pp. 181-199
    • Schnorr, C.-P.1    Euchner, M.2
  • 38
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
    • Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 288-303
    • Wagner, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.