A practical implementation of identity-based encryption over NTRU lattices
From MaRDI portal
Recommendations
- Efficient identity-based encryption over NTRU lattices
- Full secure identity-based encryption scheme with short public key size over lattices in the standard model
- Practical implementation of Ring-SIS/LWE based signature and IBE
- Revocable Identity-Based Encryption from Lattices
- Efficient lattice (H)IBE in the standard model
Cited in
(9)- Efficient identity-based encryption over NTRU lattices
- Efficient identity-based encryption from LWR
- Implementation of lattice trapdoors on modules and applications
- Puncturable Identity-Based Encryption from Lattices
- scientific article; zbMATH DE number 5222384 (Why is no real title available?)
- Identity-based encryption from lattices using approximate trapdoors
- Towards compact identity-based encryption on ideal lattices
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
- Algorithms for the Generalized NTRU Equations and their Storage Analysis
This page was built for publication: A practical implementation of identity-based encryption over NTRU lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1744860)