Generalized Compact Knapsacks Are Collision Resistant

From MaRDI portal
Publication:3591445

DOI10.1007/11787006_13zbMath1133.68353OpenAlexW1546634390MaRDI QIDQ3591445

Vadim Lyubashevsky, Daniele Micciancio

Publication date: 11 September 2007

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11787006_13




Related Items (71)

Cyclic and well-rounded latticesCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsSubtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over latticesAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyTightly secure signatures from lossy identification schemesParallel Hashing via List RecoverabilityGadget-based iNTRU lattice trapdoorsMemory lower bounds of reductions revisitedShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsPost-quantum cryptography: lattice signaturesVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsOn ideal lattices, Gröbner bases and generalized hash functionsAsymptotically quasi-optimal cryptographyLattice trapdoors and IBE from middle-product LWEOn the complexity of collision resistant hash functions: new and old black-box separationsA pseudorandom number generator based on worst-case lattice problemsPost-quantum online voting schemeAsymptotically efficient lattice-based digital signaturesBonsai trees, or how to delegate a lattice basisFunctional commitments for all functions, with transparent setup and from SISScalable zero knowledge via cycles of elliptic curvesDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsOptimisations and tradeoffs for HElibA thorough treatment of highly-efficient NTRU instantiationsThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Practical sublinear proofs for R1CS from latticesSome easy instances of ideal-SVP and implications on the partial Vandermonde knapsack problemFiat-Shamir signatures based on module-NTRUVerifiable Decryption for Fully Homomorphic EncryptionLattices from Hermitian function fieldsRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresA new lattice-based online/offline signatures framework for low-power devicesReductions from module lattices to free module lattices, and application to dequantizing module-LLLOn the tightness of forward-secure signature reductionsOn the geometry of cyclic latticesA verifiable threshold secret sharing scheme based on latticesA characterization of chameleon hash functions and new, efficient designsTrapdoor delegation and HIBE from middle-product LWE in standard modelStrongly secure authenticated key exchange from factoring, codes, and latticesTighter Reductions for Forward-Secure Signature SchemesSecurity analysis of cryptosystems using short generators over ideal latticesOne-Shot Verifiable Encryption from LatticesShort Stickelberger Class Relations and Application to Ideal-SVPShort Bases of Lattices over Number FieldsImproved Zero-Knowledge Identification with LatticesInterpreting Hash Function Security ProofsCryptographic Functions from Worst-Case Complexity AssumptionsA framework for cryptographic problems from linear algebraHash Functions from Sigma Protocols and Improvements to VSHConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsLattice-Based Identification Schemes Secure Under Active AttacksAsymptotically Efficient Lattice-Based Digital SignaturesPost-Quantum Cryptography: State of the ArtInteger Version of Ring-LWE and Its ApplicationsMPSign: a signature from small-secret middle-product learning with errorsOn the ideal shortest vector problem over random rational primesOn the security of homomorphic encryption on approximate numbersThe Geometry of Lattice CryptographyOn the integer polynomial learning with errors problemChosen-ciphertext lattice-based public key encryption with equality test in standard modelPractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyOn Lattices Generated by Finite Abelian GroupsRandom self-reducibility of ideal-SVP via Arakelov random walksPractical product proofs for lattice commitmentsLattice-based blind signatures, revisitedA Parallel GPU Implementation of SWIFFTXUnnamed ItemWorst-case to average-case reductions for module latticesOn ideal class group computation of imaginary multiquadratic fields


Uses Software



This page was built for publication: Generalized Compact Knapsacks Are Collision Resistant