Bonsai trees, or how to delegate a lattice basis

From MaRDI portal
Publication:1928766


DOI10.1007/s00145-011-9105-2zbMath1277.94017WikidataQ59163683 ScholiaQ59163683MaRDI QIDQ1928766

Chris Peikert, Eike Kiltz, David Cash, Dennis Hofheinz

Publication date: 4 January 2013

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://ir.cwi.nl/pub/16843


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Unnamed Item, Algorithms for the Generalized NTRU Equations and their Storage Analysis, The Complexity of Public-Key Cryptography, Generic Constructions of Revocable Identity-Based Encryption, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Simple and generic constructions of succinct functional encryption, Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance, More efficient adaptively secure lattice-based IBE with equality test in the standard model, Candidate witness encryption from lattice techniques, Post-quantum asynchronous deniable key exchange and the signal handshake, Public key authenticated encryption with keyword search from LWE, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Faster Gaussian sampling for trapdoor lattices with arbitrary modulus, Anonymous IBE, leakage resilience and circular security from new assumptions, A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity, Unbounded multi-party computation from learning with errors, Revocable hierarchical attribute-based signatures from lattices, Black-box accumulation based on lattices, On the higher-bit version of approximate inhomogeneous short integer solution problem, Lattice-based IBE with equality test supporting flexible authorization in the standard model, Dynamic collusion bounded functional encryption from identity-based encryption, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Efficient public-key encryption with equality test from lattices, A new Gaussian sampling for trapdoor lattices with arbitrary modulus, Strongly unforgeable ring signature scheme from lattices in the standard model, Survey of information security, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Adaptively secure inner product encryption from LWE, Updatable public key encryption in the standard model, Vector and functional commitments from lattices, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Targeted Homomorphic Attribute-Based Encryption


Uses Software


Cites Work