Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

From MaRDI portal
Publication:2475579

DOI10.1007/s00037-007-0234-9zbMath1133.68024OpenAlexW2122086332MaRDI QIDQ2475579

Daniele Micciancio

Publication date: 11 March 2008

Published in: Computational Complexity (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00037-007-0234-9




Related Items (52)

Cyclic and well-rounded latticesOn the hardness of module-LWE with binary secretAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionTightly secure signatures from lossy identification schemesRestricted linear congruencesMemory lower bounds of reductions revisitedFaster Gaussian sampling for trapdoor lattices with arbitrary modulusShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsThe Modular Subset-Sum Problem and the size of deletion correcting codesA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyAlgebraically structured LWE. RevisitedA pseudorandom number generator based on worst-case lattice problemsAsymptotically efficient lattice-based digital signaturesBonsai trees, or how to delegate a lattice basisOn the hardness of module learning with errors with short distributionsFunctional commitments for all functions, with transparent setup and from SISThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Balanced non-adjacent formsHardness of (M)LWE with semi-uniform seedsTowards classical hardness of module-LWE: the linear rank caseAn efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using latticeOn the geometry of cyclic latticesA New Analysis of the McEliece Cryptosystem Based on QC-LDPC CodesA verifiable threshold secret sharing scheme based on latticesOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeImproved (Hierarchical) Inner-Product Encryption from LatticesSecurity analysis of cryptosystems using short generators over ideal latticesProvably Secure NTRU Instances over Prime Cyclotomic RingsShort Stickelberger Class Relations and Application to Ideal-SVPShort Bases of Lattices over Number FieldsImproved Zero-Knowledge Identification with LatticesInterpreting Hash Function Security Proofs(Leveled) Fully Homomorphic Encryption without BootstrappingCryptographic Functions from Worst-Case Complexity AssumptionsA framework for cryptographic problems from linear algebraConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsTowards a ring analogue of the leftover hash lemmaAsymptotically Efficient Lattice-Based Digital SignaturesBetter Key Sizes (and Attacks) for LWE-Based EncryptionAn Efficient Post-Quantum One-Time Signature SchemeOn the ideal shortest vector problem over random rational primesOn the security of homomorphic encryption on approximate numbersThe Geometry of Lattice CryptographyUnnamed ItemTightly secure signature schemes from the LWE and subset sum assumptionsRandom self-reducibility of ideal-SVP via Arakelov random walksCovert authentication from latticesPermutation invariant latticesWorst-case to average-case reductions for module lattices


Uses Software



This page was built for publication: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions