메뉴 건너뛰기




Volumn 6841 LNCS, Issue , 2011, Pages 465-484

Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RANDOM PROCESSES;

EID: 80051960879     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22792-9_26     Document Type: Conference Paper
Times cited : (118)

References (35)
  • 1
    • 77954625601 scopus 로고    scopus 로고
    • Efficient Lattice (H)IBE in the Standard Model
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 2
    • 77957015647 scopus 로고    scopus 로고
    • Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98-115. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 98-115
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 4
    • 0344550526 scopus 로고    scopus 로고
    • Proving Hard-Core Predicates Using List Decoding
    • Akavia, A., Goldwasser, S., Safra, S.: Proving Hard-Core Predicates Using List Decoding. In: FOCS, pp. 146-157 (2003)
    • (2003) FOCS , pp. 146-157
    • Akavia, A.1    Goldwasser, S.2    Safra, S.3
  • 5
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous Hardcore Bits and Cryptography against Memory Attacks
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 6
    • 70350342511 scopus 로고    scopus 로고
    • Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 7
    • 80051978292 scopus 로고    scopus 로고
    • New algorithms for learning in presence of errors
    • Arora, S., Ge, R.: New algorithms for learning in presence of errors. In: ICALP (2011), http://www.eccc.uni-trier.de/report/2010/066/
    • (2011) ICALP
    • Arora, S.1    Ge, R.2
  • 8
    • 0028062299 scopus 로고
    • Weakly Learning DNF and Characterizing Statistical Query Learning using Fourier Analysis
    • Blum, A., Furst, M.L., Jackson, J.C., Kearns, M.J., Mansour, Y., Rudich, S.: Weakly Learning DNF and Characterizing Statistical Query Learning using Fourier Analysis. In: STOC, pp. 253-262 (1994)
    • (1994) STOC , pp. 253-262
    • Blum, A.1    Furst, M.L.2    Jackson, J.C.3    Kearns, M.J.4    Mansour, Y.5    Rudich, S.6
  • 9
    • 84877639283 scopus 로고
    • Cryptographic Primitives Based on Hard Learning Problems
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Blum, A., Furst, M.L., Kearns, M. J., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.L.2    Kearns, M.J.3    Lipton, R.J.4
  • 10
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai Trees, or How to Delegate a Lattice Basis
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 11
    • 77949580684 scopus 로고    scopus 로고
    • Public-Key Encryption Schemes with Auxiliary Inputs
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-Key Encryption Schemes with Auxiliary Inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Tauman Kalai, Y.3    Peikert, C.4    Vaikuntanathan, V.5
  • 12
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245-255. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 245-255
    • Fischer, J.-B.1    Stern, J.2
  • 13
    • 77954628604 scopus 로고    scopus 로고
    • A Simple BGN-Type Cryptosystem from LWE
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Gentry, C., Halevi, S., Vaikuntanathan, V.: A Simple BGN-Type Cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506-522. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 506-522
    • Gentry, C.1    Halevi, S.2    Vaikuntanathan, V.3
  • 14
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for Hard Lattices and New Cryptographic Constructions
    • ACM, New York
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for Hard Lattices and New Cryptographic Constructions. In: STOC, pp. 197-206. ACM, New York (2008)
    • (2008) STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 15
    • 0024868772 scopus 로고
    • A Hard-Core Predicate for All One-Way Functions
    • Goldreich, O., Levin, L.A.: A Hard-Core Predicate for All One-Way Functions. In: STOC, pp. 25-32 (1989)
    • (1989) STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 17
    • 0024771884 scopus 로고
    • How to Recycle Random Bits
    • IEEE Computer Society, Washington, DC, USA
    • Impagliazzo, R., Zuckerman, D.: How to Recycle Random Bits. In: FOCS, pp. 248-253. IEEE Computer Society, Washington, DC, USA (1989)
    • (1989) FOCS , pp. 248-253
    • Impagliazzo, R.1    Zuckerman, D.2
  • 18
    • 0001143795 scopus 로고    scopus 로고
    • Efficient Cryptographic Schemes Provably as Secure as Subset Sum
    • Impagliazzo, R., Naor, M.: Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J. Cryptology 9(4), 199-216 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.4 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 19
    • 77954759293 scopus 로고    scopus 로고
    • Parallel and Concurrent Security of the HB and HB+ Protocols
    • Katz, J., Shin, J.S., Smith, A.: Parallel and Concurrent Security of the HB and HB+ Protocols. J. Cryptology 23(3), 402-421 (2010)
    • (2010) J. Cryptology , vol.23 , Issue.3 , pp. 402-421
    • Katz, J.1    Shin, J.S.2    Smith, A.3
  • 20
    • 38049064421 scopus 로고    scopus 로고
    • Multi-bit cryptosystems based on lattice problems
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Kawachi, A., Tanaka, K., Xagawa, K.: Multi-bit cryptosystems based on lattice problems. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 315-329. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 315-329
    • Kawachi, A.1    Tanaka, K.2    Xagawa, K.3
  • 21
    • 85006528164 scopus 로고
    • Learning Decision Trees Using the Fourier Sprectrum
    • Kushilevitz, E., Mansour, Y.: Learning Decision Trees Using the Fourier Sprectrum. In: STOC, pp. 455-464 (1991)
    • (1991) STOC , pp. 455-464
    • Kushilevitz, E.1    Mansour, Y.2
  • 22
    • 79951793525 scopus 로고    scopus 로고
    • Better Key Sizes (and Attacks) for LWE-Based Encryption
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 319-339
    • Lindner, R.1    Peikert, C.2
  • 23
    • 70350336456 scopus 로고    scopus 로고
    • On bounded distance decoding, unique shortest vectors, and the minimum distance problem
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 577-594
    • Lyubashevsky, V.1    Micciancio, D.2
  • 24
    • 77954639468 scopus 로고    scopus 로고
    • On Ideal Lattices and Learning with Errors over Rings
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 1-23
    • Lyubashevsky, V.1    Peikert, C.2    Regev, O.3
  • 25
    • 79951786798 scopus 로고    scopus 로고
    • Duality in Lattice Based Cryptography
    • invited talk
    • Micciancio, D.: Duality in Lattice Based Cryptography. In: Public Key Cryptography (2010) (invited talk)
    • (2010) Public Key Cryptography
    • Micciancio, D.1
  • 26
    • 70350294927 scopus 로고    scopus 로고
    • Lattice-Based Cryptography
    • Springer Publishing Company, Heidelberg
    • Micciancio, D., Regev, O.: Lattice-Based Cryptography. In: Post Quantum Cryptography, pp. 147-191. Springer Publishing Company, Heidelberg (2009)
    • (2009) Post Quantum Cryptography , pp. 147-191
    • Micciancio, D.1    Regev, O.2
  • 28
    • 70350642078 scopus 로고    scopus 로고
    • Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
    • ACM, New York
    • Peikert, C.: Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem. In: STOC, pp. 333-342. ACM, New York (2009)
    • (2009) STOC , pp. 333-342
    • Peikert, C.1
  • 29
    • 51849126892 scopus 로고    scopus 로고
    • A Framework for Efficient and Composable Oblivious Transfer
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3
  • 30
    • 51849152661 scopus 로고    scopus 로고
    • Lossy Trapdoor Functions and Their Applications
    • ACM, New York
    • Peikert, C., Waters, B.: Lossy Trapdoor Functions and Their Applications. In: STOC, pp. 187-196. ACM, New York (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 31
    • 70349309809 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Preliminary version in STOC 2005
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Journal of ACM 56(6), 34 (2009); Preliminary version in STOC 2005
    • (2009) Journal of ACM , vol.56 , Issue.6 , pp. 34
    • Regev, O.1
  • 32
  • 33
    • 80052005297 scopus 로고    scopus 로고
    • Estimating the Security of Lattice-based Cryptosystems
    • Technical Report 2010/137
    • Rückert, M., Schneider, M.: Estimating the Security of Lattice-based Cryptosystems. Technical Report 2010/137, IACR ePrint archive (2010)
    • (2010) IACR EPrint Archive
    • Rückert, M.1    Schneider, M.2
  • 35
    • 72449142727 scopus 로고    scopus 로고
    • Efficient Public Key Encryption Based on Ideal Lattices
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Stehlé, D., Steinfeld, R., Tanaka, K., Xagawa, K.: Efficient Public Key Encryption Based on Ideal Lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 617-635. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 617-635
    • Stehlé, D.1    Steinfeld, R.2    Tanaka, K.3    Xagawa, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.