搜索结果: 16-30 共查到“军事学 Lattices”相关记录104条 . 查询时间(0.032 秒)
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Attribute-based signatures generic constructions lattices
2018/1/11
In this work, we affirmatively close the gap between ABS schemes based on bilinear maps and lattices by constructing the first lattice-based ABS scheme for unbounded circuits in the random oracle mode...
Constant-size Group Signatures from Lattices
lattice-based cryptography constant-size group signatures zero-knowledge proofs
2018/1/11
Lattice-based group signature is an active research topic in recent years. Since the pioneering work by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010), ten other schemes have been proposed, providin...
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
applications digital signatures implementation
2018/1/2
Lattice trapdoors are an important primitive used in a wide range of cryptographic protocols, such as identity-based encryption (IBE), attribute-based encryption, functional encryption, and program ob...
We propose a lattice-based electronic voting scheme, EVOLVE (Electronic Voting from Lattices with Verification), which is conjectured to resist attacks by quantum computers. Our protocol involves a nu...
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Lattice based cryptography Dynamic group signature forward security
2017/11/28
Secret key exposure is at high risk in the computing infrastructure due to the increase in use of harmful devices. As a result, achieving forward secrecy is a preferable feature for any cryptosystem w...
A Practical Implementation of Identity-Based Encryption over NTRU Lattices
lattice-based cryptography identity-based encryption NTRU
2017/11/1
An identity-based encryption scheme enables the efficient distribution of keys in a multi-user system. Such schemes are particularly attractive in resource constrained environments where critical reso...
Direct Anonymous Attestation from Lattices
Lattice-based Cryptography Anonymous Signatures DAA
2017/10/25
Direct Anonymous Attestation (DAA) is a complex cryptographic protocol that has been widely deployed in practice, with more than 500 million machines in the market that are already equipped with its h...
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
trapdoor function CVP lattice
2017/10/16
In this paper, we propose new classes of trapdoor functions to solve the closest vector problem in lattices. Specifically, we construct lattices based on properties of polynomials for which the closes...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many applications since then, in particu...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
Password-based authenticated key exchange (PAKE) enables two users with shared low-entropy passwords to establish cryptographically strong session keys over insecure networks. At Asiacrypt 2009, Katz ...
Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA
lattice techniques RSA cryptanalysis
2017/9/1
We present a principled technique for reducing the matrix size in some applications of Coppersmith's lattice method for finding roots of modular polynomial equations. It relies on an analysis of the a...
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
digital signatures post-quantum cryptography implementations
2017/6/28
This paper presents Dilithium, a lattice-based signature scheme that is part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package that will be submitted to the NIST call for post-quant...
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
all-but-many lossy trapdoor functions lattice selective opening attacks
2017/6/8
Our second result is a public-key system tightly secure against ``selective opening'' attacks, where an attacker gets many challenges and can ask to see the random bits of any of them. Following the s...
In this work, we design a new lattice encoding structure for vectors. Our encoding can be used to achieve a packed FHE scheme that allows some SIMD operations and can be used to improve all the prior ...