An improved compression technique for signatures based on learning with errors
From MaRDI portal
Publication:5404744
DOI10.1007/978-3-319-04852-9_2zbMATH Open1295.94011OpenAlexW49132692WikidataQ61914011 ScholiaQ61914011MaRDI QIDQ5404744FDOQ5404744
Authors: Shi Bai, Steven D. Galbraith
Publication date: 28 March 2014
Published in: Topics in Cryptology – CT-RSA 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-04852-9_2
Recommendations
Cited In (49)
- Lattice-based proof of shuffle and applications to electronic voting
- SoK: how (not) to design and implement post-quantum cryptography
- Analysis of error-correcting codes for lattice-based key exchange
- Document ranking for variable bit-block compression signatures
- Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
- Analysis of error terms of signatures based on learning with errors
- On removing rejection conditions in practical lattice-based signatures
- SETLA: Signature and Encryption from Lattices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- A new lattice-based online/offline signatures framework for low-power devices
- Post-quantum cryptography: state of the art
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- G+G: a Fiat-Shamir lattice signature based on convolved Gaussians
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Comparison of signature file models with superimposed coding
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Multitarget decryption failure attacks and their application to Saber and Kyber
- Lattice-based programmable hash functions and applications
- Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Efficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFs
- Masking the GLP lattice-based signature scheme at any order
- A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme
- MPSign: a signature from small-secret middle-product learning with errors
- Signatures from sequential-OR proofs
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
- A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling
- Compact ring signatures from learning with errors
- A practical post-quantum public-key cryptosystem based on spLWE
- Short zero-knowledge proof of knowledge for lattice-based commitment
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
- The lattice-based digital signature scheme qTESLA
- A Compact Digital Signature Scheme Based on the Module-LWR Problem
- Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding
- Duplication free public keys based on SIS-type problems
- Concretely efficient lattice-based polynomial commitment from standard assumptions
- Fiat-Shamir signatures based on module-NTRU
- Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
- A new R-LWE based digital signature scheme
- Topics in Cryptology – CT-RSA 2004
- Estimation of the hardness of the learning with errors problem with a restricted number of samples
- Practical exact proofs from lattices: new techniques to exploit fully-splitting rings
- Asymptotically efficient lattice-based digital signatures
- Quantum-resistant identity-based signature with message recovery and proxy delegation
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Title not available (Why is that?)
- On rejection sampling in Lyubashevsky's signature scheme
Uses Software
This page was built for publication: An improved compression technique for signatures based on learning with errors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404744)