New lattice-based cryptographic constructions

From MaRDI portal
Publication:5435669

DOI10.1145/1039488.1039490zbMath1125.94026OpenAlexW1972050218MaRDI QIDQ5435669

Oded Regev

Publication date: 14 January 2008

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1039488.1039490



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (66)

Lattice-based key exchange on small integer solution problemImproved hardness results for unique shortest vector problemA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsAugmented Learning with Errors: The Untapped Potential of the Error TermThe hunting of the SNARKComputational indistinguishability between quantum states and its cryptographic applicationUnnamed ItemSTP-LWE: A variant of learning with error for a flexible encryptionDeterministic compression with uncertain priorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsQuantum algorithm design: techniques and applicationsUsing the Inhomogeneous Simultaneous Approximation Problem for Cryptographic DesignEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesOn the structure of Boolean functions with small spectral normCryptographic Functions from Worst-Case Complexity AssumptionsThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsFinding Shortest Lattice Vectors in the Presence of GapsPost-Quantum Forward-Secure Onion RoutingDecompositions of Triangle-Dense GraphsPredicting Lattice ReductionBetter Key Sizes (and Attacks) for LWE-Based EncryptionCryptographic hardness for learning intersections of halfspacesQuantum algorithms for algebraic problemsApproximating the Closest Vector Problem Using an Approximate Shortest Vector OracleCurves, Jacobians, and cryptographyAuthenticated Byzantine Generals in Dual Failure ModelMeasure inequalities and the transference theorem in the geometry of numbers




This page was built for publication: New lattice-based cryptographic constructions