메뉴 건너뛰기




Volumn 7147 LNCS, Issue , 2012, Pages 99-114

Cryptography from learning parity with noise

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC SCHEMES; EXPONENTIAL TIME; LEARNING PARITY WITH NOISE; LIGHT WEIGHT; PROVABLE SECURITY; PROVABLY SECURE; PSEUDORANDOM GENERATORS; PUBLIC KEYS; QUANTUM ALGORITHMS; RANDOM LINEAR CODES; RF-ID TAGS; SPACE REQUIREMENTS; SYMMETRIC KEY ENCRYPTION; ZERO KNOWLEDGE PROOF;

EID: 84856034151     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27660-6_9     Document Type: Conference Paper
Times cited : (87)

References (48)
  • 1
    • 77954751550 scopus 로고    scopus 로고
    • Public-key cryptography from different assumptions
    • Schulman, L.J. (ed.) ACM Press
    • Applebaum, B., Barak, B., Wigderson, A.: Public-key cryptography from different assumptions. In: Schulman, L.J. (ed.) 42nd ACM STOC, pp. 171-180. ACM Press (2010)
    • (2010) 42nd ACM STOC , pp. 171-180
    • Applebaum, B.1    Barak, B.2    Wigderson, A.3
  • 2
    • 70350342511 scopus 로고    scopus 로고
    • Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 3
    • 79960014155 scopus 로고    scopus 로고
    • New Algorithms for Learning in Presence of Errors
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Springer, Heidelberg
    • Arora, S., Ge, R.: New Algorithms for Learning in Presence of Errors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I. LNCS, vol. 6755, pp. 403-415. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6755 , Issue.PART I , pp. 403-415
    • Arora, S.1    Ge, R.2
  • 4
    • 0344118879 scopus 로고    scopus 로고
    • More on average case vs approximation complexity
    • IEEE Computer Society Press
    • Alekhnovich, M.: More on average case vs approximation complexity. In: 44th FOCS, pp. 298-307. IEEE Computer Society Press (2003)
    • (2003) 44th FOCS , pp. 298-307
    • Alekhnovich, M.1
  • 5
    • 84877639283 scopus 로고
    • Cryptographic Primitives Based on Hard Learning Problems
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Blum, A., Furst, M.L., Kearns, M.J., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.L.2    Kearns, M.J.3    Lipton, R.J.4
  • 6
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • Blum, A., Adam Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
    • (2003) J. ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Adam Kalai, A.2    Wasserman, H.3
  • 9
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Ashby, V. (ed.) ACM Press
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62-73. ACM Press (1993)
    • (1993) ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai Trees, or How to Delegate a Lattice Basis
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 11
    • 44449176564 scopus 로고    scopus 로고
    • The Twin Diffie-Hellman Problem and Applications
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 127-145
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 12
    • 0001555328 scopus 로고
    • Rapid multiplication of rectangular matrices
    • Coppersmith, D.: Rapid multiplication of rectangular matrices. SIAM J. Comput. 11(3), 467-471 (1982)
    • (1982) SIAM J. Comput. , vol.11 , Issue.3 , pp. 467-471
    • Coppersmith, D.1
  • 14
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 15
    • 34547698378 scopus 로고    scopus 로고
    • New results for learning noisy parities and halfspaces
    • IEEE Computer Society Press
    • Feldman, V., Gopalan, P., Khot, S., Ponnuswami, A.K.: New results for learning noisy parities and halfspaces. In: 47th FOCS, pp. 563-574. IEEE Computer Society Press (2006)
    • (2006) 47th FOCS , pp. 563-574
    • Feldman, V.1    Gopalan, P.2    Khot, S.3    Ponnuswami, A.K.4
  • 16
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Mitzenmacher, M. (ed.) ACM Press
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 169-178. ACM Press (2009)
    • (2009) 41st ACM STOC , pp. 169-178
    • Gentry, C.1
  • 18
  • 19
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 20
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(3), 691-729 (1991)
    • (1991) Journal of the ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 21
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Ladner, R.E., Dwork, C. (eds.) ACM Press
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 197-206. ACM Press (2008)
    • (2008) 40th ACM STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 23
    • 44449155290 scopus 로고    scopus 로고
    • +
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • +. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 361-378
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 24
    • 49149109143 scopus 로고    scopus 로고
    • How to Encrypt with the LPN Problem
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Springer, Heidelberg
    • Gilbert, H., Robshaw, M.J.B., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , Issue.PART II , pp. 679-690
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 25
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 29
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 30
    • 79957999442 scopus 로고    scopus 로고
    • Efficient Authentication from Hard Learning Problems
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 7-26
    • Kiltz, E.1    Pietrzak, K.2    Cash, D.3    Jain, A.4    Venturi, D.5
  • 31
    • 77954759293 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402-421 (2010)
    • (2010) Journal of Cryptology , vol.23 , Issue.3 , pp. 402-421
    • Katz, J.1    Shin, J.S.2    Smith, A.3
  • 32
    • 33749998666 scopus 로고    scopus 로고
    • An Improved LPN Algorithm
    • De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
    • Levieil, É., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4116 , pp. 348-359
    • Levieil, É.1    Fouque, P.-A.2
  • 33
    • 50249148926 scopus 로고    scopus 로고
    • SWIFFT: A Modest Proposal for FFT Hashing
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 54-72
    • Lyubashevsky, V.1    Micciancio, D.2    Peikert, C.3    Rosen, A.4
  • 34
    • 77954639468 scopus 로고    scopus 로고
    • On Ideal Lattices and Learning with Errors over Rings
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors Over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 1-23
    • Lyubashevsky, V.1    Peikert, C.2    Regev, O.3
  • 35
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2) (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 36
    • 26944487960 scopus 로고    scopus 로고
    • The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
    • Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. Springer, Heidelberg
    • Lyubashevsky, V.: The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3624 , pp. 378-389
    • Lyubashevsky, V.1
  • 37
    • 0002448405 scopus 로고
    • A Public-Key Cryptosystem Based on Algebraic Coding Theory
    • McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
    • (1978) Deep Space Network Progress Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 39
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336-375 (1999)
    • (1999) J. Comput. Syst. Sci. , vol.58 , Issue.2 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 40
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract
    • Mitzenmacher, M. (ed.) ACM Press
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 333-342. ACM Press (2009)
    • (2009) 41st ACM STOC , pp. 333-342
    • Peikert, C.1
  • 42
    • 84867955018 scopus 로고    scopus 로고
    • A new np-complete problem and public-key identification
    • Pointcheval, D., Poupard, G.: A new np-complete problem and public-key identification. Des. Codes Cryptography 28(1), 5-31 (2003)
    • (2003) Des. Codes Cryptography , vol.28 , Issue.1 , pp. 5-31
    • Pointcheval, D.1    Poupard, G.2
  • 43
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Gabow, H.N., Fagin, R. (eds.) ACM Press
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) 37th ACM STOC, pp. 84-93. ACM Press (2005)
    • (2005) 37th ACM STOC , pp. 84-93
    • Regev, O.1
  • 44
    • 77955253445 scopus 로고    scopus 로고
    • The learning with errors problem (invited survey)
    • Regev, O.: The learning with errors problem (invited survey). In: IEEE Conference on Computational Complexity, pp. 191-204 (2010)
    • (2010) IEEE Conference on Computational Complexity , pp. 191-204
    • Regev, O.1
  • 45
    • 0000537828 scopus 로고
    • Efficient Identification and Signatures for Smart Cards
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 46
    • 85032871579 scopus 로고
    • An Efficient Identification Scheme based on Permuted Kernels
    • (Extended Abstract). Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Shamir, A.: An Efficient Identification Scheme based on Permuted Kernels (Extended Abstract). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 606-609. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 606-609
    • Shamir, A.1
  • 47
    • 84964937021 scopus 로고
    • A Method for Finding Codewords of Small Weight
    • Cohen, G., Godlewski, P. (eds.) Coding Theory 1986. Springer, Heidelberg
    • Stern, J.: A Method for Finding Codewords of Small Weight. In: Cohen, G., Godlewski, P. (eds.) Coding Theory 1986. LNCS, vol. 311, pp. 106-113. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.311 , pp. 106-113
    • Stern, J.1
  • 48
    • 84955595109 scopus 로고
    • A New Identification Scheme Based on Syndrome Decoding
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Stern, J.: A New Identification Scheme Based on Syndrome Decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13-21. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 13-21
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.