How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
From MaRDI portal
Publication:2873651
DOI10.1007/978-3-642-38980-1_14zbMath1330.94036OpenAlexW163848421MaRDI QIDQ2873651
Sara Krehbiel, Rikke Bendlin, Chris Peikert
Publication date: 24 January 2014
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38980-1_14
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (13)
Adaptively secure distributed PRFs from LWE ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ Post-quantum online voting scheme ⋮ MuSig-L: lattice-based multi-signature with single-round online phase ⋮ Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key ⋮ Lattice-based identity-based resplittable threshold public key encryption scheme ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Identity-based encryption with security against the KGC: a formal model and its instantiations ⋮ A new Gaussian sampling for trapdoor lattices with arbitrary modulus
This page was built for publication: How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE