Bonsai Trees, or How to Delegate a Lattice Basis

From MaRDI portal
Publication:3563854

DOI10.1007/978-3-642-13190-5_27zbMath1280.94043DBLPconf/eurocrypt/CashHKP10OpenAlexW1499766499WikidataQ26215797 ScholiaQ26215797MaRDI QIDQ3563854

Chris Peikert, Dennis Hofheinz, David Cash, Eike Kiltz

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_27




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelLattice-based key exchange on small integer solution problemEfficient multi-party concurrent signature from latticesA Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelCryptography from Learning Parity with NoiseLattice-based linearly homomorphic signatures in the standard modelLattice-based certificateless encryption schemeFunctional encryption for Turing machines with dynamic bounded collusion from LWEDoes Fiat-Shamir require a cryptographic hash function?Policy-based signature scheme from latticesTightly secure signatures from lossy identification schemesAttribute-based access control for inner product functional encryption from LWEDeniable Attribute Based Encryption for Branching Programs from LWEAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelZero-Knowledge Interactive Proof Systems for New Lattice ProblemsFully leakage-resilient signaturesPuncturable identity-based and attribute-based encryption from latticesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeAttribute-based proxy re-encryption from standard latticesAnonymous and leakage resilient IBE and IPELattice trapdoors and IBE from middle-product LWEBonsai trees, or how to delegate a lattice basisAugmented Learning with Errors: The Untapped Potential of the Error TermHardness of \(k\)-LWE and applications in traitor tracingZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsShorter identity-based encryption via asymmetric pairingsGaussian sampling of lattices for cryptographic applicationsRelations between semantic security and anonymity in identity-based encryptionIdentity-based key-exposure resilient cloud storage public auditing scheme from latticesCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsNon-committing encryption with constant ciphertext expansion from standard assumptionsProgrammable hash functions and their applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyGroup signature from lattices preserving forward security in dynamic settingZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionIdentity-Based Blind Signature from Lattices in Standard ModelA lattice-based identity-based proxy blind signature scheme in the standard modelAn efficient homomorphic aggregate signature scheme based on latticeLattice-based completely non-malleable public-key encryption in the standard modelEfficient selective identity-based encryption without random oraclesSecure multi-source network coding scheme with lattice signatureCompact (Targeted Homomorphic) Inner Product Encryption from LWECompact Inner Product Encryption from LWECompact Hierarchical IBE from Lattices in the Standard ModelSimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseTrapdoor delegation and HIBE from middle-product LWE in standard modelStrongly secure authenticated key exchange from factoring, codes, and latticesAlgebraic (trapdoor) one-way functions: constructions and applicationsA lattice-based group signature scheme with verifier-local revocationDeterministic public-key encryption for adaptively-chosen plaintext distributionsDoubly spatial encryption from DBDHImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsImproved (Hierarchical) Inner-Product Encryption from LatticesAnonymous HIBE with short ciphertexts: full security in prime order groupsGenerating shorter bases for hard random latticesConfined guessing: new signatures from standard assumptionsGeneric Construction of UC-Secure Oblivious TransferAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyVerifiable Random Functions from Standard AssumptionsLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyA lattice-based signcryption scheme without random oraclesBetter Key Sizes (and Attacks) for LWE-Based EncryptionRevocable attribute-based proxy re-encryptionVerifiable random functions: relations to identity-based key encapsulation and new constructionsOne-Time Signatures and Chameleon Hash FunctionsOptimal broadcast encryption from pairings and LWEImpossibility results for lattice-based functional encryption schemesDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsMultiparty reusable non-interactive secure computation from LWEChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionA lattice-based fully dynamic group signature scheme without NIZKThe Geometry of Lattice CryptographyA Lattice-Based Group Signature Scheme with Message-Dependent OpeningTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsAnonymous Encryption with Partial-Order Subset Delegation FunctionalityExact lattice sampling from non-Gaussian distributionsEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceIdentity-based encryption with security against the KGC: a formal model and its instantiationsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesWildcarded identity-based encryption from latticesLWE from non-commutative group ringsEfficient Threshold Encryption from Lossy Trapdoor FunctionsLattice-based group signatures: achieving full dynamicity (and deniability) with easeChosen-ciphertext lattice-based public key encryption with equality test in standard modelAdaptively secure constrained pseudorandom functions in the standard modelProgressive and efficient verification for digital signaturesLattice-based linearly homomorphic signature scheme over binary fieldPassword protected secret sharing from latticesImplementation of lattice trapdoors on modules and applicationsGenerating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)Short identity-based signatures with tight security from latticesKey-homomorphic pseudorandom functions from LWE with small modulusIntegral matrix Gram root and lattice Gaussian sampling without floats






This page was built for publication: Bonsai Trees, or How to Delegate a Lattice Basis