Lattice Signatures without Trapdoors

From MaRDI portal
Revision as of 19:33, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2894441

DOI10.1007/978-3-642-29011-4_43zbMath1295.94111OpenAlexW121367636MaRDI QIDQ2894441

Vadim Lyubashevsky

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_43




Related Items (only showing first 100 items - show all)

DualRing: generic construction of ring signatures with efficient instantiationsLattice-based key exchange on small integer solution problemLattice-based proof of shuffle and applications to electronic votingEfficient multi-party concurrent signature from latticesUntraceability of Partial Blind and Blind Signature SchemesConcretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentSubtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over latticesA compressed \(\varSigma \)-protocol theory for latticesA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsSMILE: set membership from ideal lattices with applications to ring signatures and confidential transactionsHow to meet ternary LWE keysLattice-based zero-knowledge arguments for additive and multiplicative relationsEfficient lattice-based polynomial evaluation and batch ZK argumentsLESS is More: Code-Based Signatures Without SyndromesLattice-based certificateless encryption schemeDoes Fiat-Shamir require a cryptographic hash function?Policy-based signature scheme from latticesFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteTightly secure signatures from lossy identification schemesCoded-BKW: Solving LWE Using Lattice CodesBlindOR: an efficient lattice-based blind signature scheme from OR-proofsOn the higher-bit version of approximate inhomogeneous short integer solution problemSurvey of information securityA generic construction of fuzzy signatureShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsInteger LWE with non-subgaussian error and related attacksA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyScalable revocable identity-based signature over lattices in the standard modelDuplication free public keys based on SIS-type problemsEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsPost-quantum online voting schemeShorter lattice-based zero-knowledge proofs for the correctness of a shuffleAsymptotically efficient lattice-based digital signaturesA Novel Certificateless Multi-signature Scheme over NTRU LatticesWhen NTT meets Karatsuba: preprocess-then-NTT technique revisitedFinding shortest lattice vectors faster using quantum searchAugmented Learning with Errors: The Untapped Potential of the Error TermCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013A novel identity-based multi-signature scheme over NTRU latticesOn the hardness of module learning with errors with short distributionsDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionFrom Identification to Signatures, Tightly: A Framework and Generic TransformsA signature scheme from the finite field isomorphism problemA code-based signature scheme from the Lyubashevsky frameworkForward-secure ID based digital signature scheme with forward-secure private key generatorLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesA full RNS variant of FV like somewhat homomorphic encryption schemesCryptanalysis of a code-based one-time signaturePractical exact proofs from lattices: new techniques to exploit fully-splitting ringsSecret handshakes: full dynamicity, deniability and lattice-based designSimulatable verifiable random function from the LWE assumptionMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedSpeeding-up verification of digital signaturesLossy Identification Schemes from Decisional RSAAnalysis of Error Terms of Signatures Based on Learning with ErrorsThe lattice-based digital signature scheme qTESLAExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationA Signcryption Scheme Based Learning with Errors over Rings Without TrapdoorMinimal condition for shortest vectors in lattices of low dimensionCryptanalysis of a code-based full-time signatureImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceFinite interval-time transition system for real-time actorsOn the Semantic Security of Functional Encryption SchemesOne-Shot Verifiable Encryption from LatticesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesUnnamed ItemA framework for cryptographic problems from linear algebraLearning strikes again: the case of the DRS signature schemeIdentity-based proxy re-signatures from latticesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceModular lattice signatures, revisitedAn efficient anti-quantum lattice-based blind signature for blockchain-enabled systemsKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesSignatures from sequential-OR proofsTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesEfficient range proofs with transparent setup from bounded integer commitmentsCryptanalysis of a rank-based signature with short public keysShorter lattice-based zero-knowledge proofs via one-time commitmentsBanquet: short and fast signatures from AESRound-optimal verifiable oblivious pseudorandom functions from ideal latticesQuantum-resistant identity-based signature with message recovery and proxy delegationThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesTightly secure signature schemes from the LWE and subset sum assumptionsLattice-based revocable certificateless signatureA non-PCP approach to succinct quantum-safe zero-knowledgePractical product proofs for lattice commitmentsLattice-based blind signatures, revisitedCovert authentication from latticesRank-Metric Codes and Their ApplicationsThe security of the code-based signature scheme based on the Stern identification protocol0-RTT Key Exchange with Full Forward SecrecyQuantum key search for ternary LWEShort identity-based signatures with tight security from latticesOn removing rejection conditions in practical lattice-based signatures






This page was built for publication: Lattice Signatures without Trapdoors