메뉴 건너뛰기




Volumn 7237 LNCS, Issue , 2012, Pages 719-737

Pseudorandom functions and lattices

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTICALLY EFFICIENT; BOOLEAN CIRCUIT; DERANDOMIZATION; ERROR TERMS; LATTICE PROBLEMS; LEARNING PROBLEM; PSEUDORANDOM FUNCTIONS; QUANTUM ALGORITHMS;

EID: 84859961213     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29011-4_42     Document Type: Conference Paper
Times cited : (334)

References (38)
  • 1
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H)IBE in the standard model
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 2
    • 77957015647 scopus 로고    scopus 로고
    • Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98-115. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 98-115
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 3
    • 38749147177 scopus 로고    scopus 로고
    • Generating hard instances of lattice problems
    • Preliminary version in STOC 1996
    • Ajtai, M.: Generating hard instances of lattice problems. Quaderni di Matematica 13, 1-32 (2004); Preliminary version in STOC 1996
    • (2004) Quaderni di Matematica , vol.13 , pp. 1-32
    • Ajtai, M.1
  • 4
    • 70350342511 scopus 로고    scopus 로고
    • Fast cryptographic primitives and circular-secure encryption based on hard learning problems
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 5
    • 79960014155 scopus 로고    scopus 로고
    • New algorithms for learning in presence of errors
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I Springer, Heidelberg
    • Arora, S., Ge, R.: New Algorithms for Learning in Presence of Errors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I. LNCS, vol. 6755, pp. 403-415. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6755 , pp. 403-415
    • Arora, S.1    Ge, R.2
  • 8
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
    • (2003) J. ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 11
    • 80955132201 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (standard) LWE
    • Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS, pp. 97-106 (2011)
    • (2011) FOCS , pp. 97-106
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 12
    • 80051986706 scopus 로고    scopus 로고
    • Fully homomorphic encryption from Ring-LWE and security for key dependent messages
    • Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
    • Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 13
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai trees, or how to delegate a lattice basis
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai Trees, or How to Delegate a Lattice Basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523-552. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 14
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 15
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197-206 (2008)
    • (2008) STOC , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 16
    • 0022793132 scopus 로고
    • How to construct random functions
    • Preliminary version in FOCS 1984
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986); Preliminary version in FOCS 1984
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 17
  • 18
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Boyd, C. (ed.) ASIACRYPT 2001 Springer, Heidelberg
    • Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 19
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
    • Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 20
    • 77954759293 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • Preliminary version in Eurocrypt
    • Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. J. Cryptology 23(3), 402-421 (2010); Preliminary version in Eurocrypt 2006
    • (2010) J. Cryptology , vol.23 , Issue.3 , pp. 402-421
    • Katz, J.1    Shin, J.S.2    Smith, A.3
  • 21
    • 79957999442 scopus 로고    scopus 로고
    • Efficient authentication from hard learning problems
    • Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 7-26
    • Kiltz, E.1    Pietrzak, K.2    Cash, D.3    Jain, A.4    Venturi, D.5
  • 22
  • 23
    • 74049161603 scopus 로고    scopus 로고
    • Efficient pseudorandom functions from the decisional linear assumption and weaker variants
    • Lewko, A.B., Waters, B.: Efficient pseudorandom functions from the decisional linear assumption and weaker variants. In: ACM Conference on Computer and Communications Security, pp. 112-120 (2009)
    • (2009) ACM Conference on Computer and Communications Security , pp. 112-120
    • Lewko, A.B.1    Waters, B.2
  • 24
    • 50249148926 scopus 로고    scopus 로고
    • SWIFFT: A modest proposal for FFT hashing
    • Nyberg, K. (ed.) FSE 2008 Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 54-72
    • Lyubashevsky, V.1    Micciancio, D.2    Peikert, C.3    Rosen, A.4
  • 25
    • 77954639468 scopus 로고    scopus 로고
    • On ideal lattices and learning with errors over rings
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 1-23
    • Lyubashevsky, V.1    Peikert, C.2    Regev, O.3
  • 26
    • 80051960879 scopus 로고    scopus 로고
    • Pseudorandom knapsacks and the sample complexity of LWE Search-to-decision reductions
    • Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
    • Micciancio, D., Mol, P.: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 465-484. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 465-484
    • Micciancio, D.1    Mol, P.2
  • 27
    • 84859976564 scopus 로고    scopus 로고
    • Trapdoors for lattices: Simpler, tighter, faster, smaller
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012 Springer, Heidelberg
    • Micciancio, D., Peikert, C.: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700-718. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 700-718
    • Micciancio, D.1    Peikert, C.2
  • 28
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • Preliminary version in FOCS 1995
    • Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336-375 (1999); Preliminary version in FOCS 1995
    • (1999) J. Comput. Syst. Sci. , vol.58 , Issue.2 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 29
    • 4243054954 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudorandom functions
    • Preliminary version in FOCS 1997
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudorandom functions. J. ACM 51(2), 231-262 (2004); Preliminary version in FOCS 1997
    • (2004) J. ACM , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 30
    • 0036588802 scopus 로고    scopus 로고
    • Pseudorandom functions and factoring
    • Preliminary version in STOC 2000
    • Naor, M., Reingold, O., Rosen, A.: Pseudorandom functions and factoring. SIAM J. Comput. 31(5), 1383-1404 (2002); Preliminary version in STOC 2000
    • (2002) SIAM J. Comput. , vol.31 , Issue.5 , pp. 1383-1404
    • Naor, M.1    Reingold, O.2    Rosen, A.3
  • 31
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: STOC, pp. 333-342 (2009)
    • (2009) STOC , pp. 333-342
    • Peikert, C.1
  • 32
    • 77956996919 scopus 로고    scopus 로고
    • An efficient and parallel gaussian sampler for lattices
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Peikert, C.: An Efficient and Parallel Gaussian Sampler for Lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80-97. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 80-97
    • Peikert, C.1
  • 33
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 34
    • 84889754057 scopus 로고    scopus 로고
    • Last retrieved from June 28, 2011
    • Pietrzak, K.: Subspace LWE (2010) (manuscript), http://homepages.cwi.nl/ ∼pietrzak/publications/SLWE.pdf (Last retrieved from June 28, 2011)
    • Subspace LWE (2010) (Manuscript)
    • Pietrzak, K.1
  • 35
    • 70349309809 scopus 로고    scopus 로고
    • On lattices learning with errors random linear codes, and cryptography
    • Preliminary version in STOC 2005
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1-40 (2009); Preliminary version in STOC 2005
    • (2009) J. ACM , vol.56 , Issue.6 , pp. 1-40
    • Regev, O.1
  • 36
    • 0026932814 scopus 로고
    • On threshold circuits and polynomial computation
    • Reif, J.H., Tate, S.R.: On threshold circuits and polynomial computation. SIAM J. Comput. 21(5), 896-908 (1992)
    • (1992) SIAM J. Comput. , vol.21 , Issue.5 , pp. 896-908
    • Reif, J.H.1    Tate, S.R.2
  • 37
    • 0023532388 scopus 로고
    • A hierarchy of polynomial time lattice basis reduction algorithms
    • Schnorr, C.-P.: A hierarchy of polynomial time lattice basis reduction algorithms. Theor. Comput. Sci. 53, 201-224 (1987)
    • (1987) Theor. Comput. Sci. , vol.53 , pp. 201-224
    • Schnorr, C.-P.1
  • 38
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully Homomorphic Encryption over the Integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.