We construct public-key cryptosystems that are secure assuming the worst-case hardness of approxi-mating the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) factor. Prior cryptosystems with worst-case connections were based either on the shortest vector problem for a special class of lattices (Ajtai and Dwork, STOC 1997; Regev, J. ACM 2004), or on the conjectured hardness of lattice problems for quantum algorithms (Regev, STOC 2005). Our main technical innovation is a reduction from certain variants of the shortest vector problem to corresponding versions of the “learning with errors ” (LWE) problem; previously, only a quantum reduction of this kind was known. In addition, we construct new cryptosys...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
In this paper we present a new NTRU-Like public key cryptosystem with security provably based on the...
V diplomski nalogi predstavimo problem LWE in šifrirno shemo osnovano na tem problemu. Pokažemo prav...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We present a probabilistic public key cryptosystem which is secure unless the worst case of the foll...
Abstract. We describe public key encryption schemes with security provably based on the worst case h...
AbstractAjtai recently found a random class of lattices of integer points for which he could prove t...
Abstract. Building upon a famous result due to Ajtai, we propose a sequence of lattice bases with gr...
We describe public key encryption schemes with security provably based on the worst case hardness of...
The shortest vector problem (SVP) in lattices is related to problems in combinatorial optimization, ...
We describe a public-key cryptosystem with worst-case/average case equivalence. The cryptosystem has...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
In this paper we present a new NTRU-Like public key cryptosystem with security provably based on the...
V diplomski nalogi predstavimo problem LWE in šifrirno shemo osnovano na tem problemu. Pokažemo prav...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We construct public-key cryptosystems that are secure assuming the *worst-case* hardness of approxim...
We present a probabilistic public key cryptosystem which is secure unless the worst case of the foll...
Abstract. We describe public key encryption schemes with security provably based on the worst case h...
AbstractAjtai recently found a random class of lattices of integer points for which he could prove t...
Abstract. Building upon a famous result due to Ajtai, we propose a sequence of lattice bases with gr...
We describe public key encryption schemes with security provably based on the worst case hardness of...
The shortest vector problem (SVP) in lattices is related to problems in combinatorial optimization, ...
We describe a public-key cryptosystem with worst-case/average case equivalence. The cryptosystem has...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
This paper is a tutorial introduction to the present state-of-the-art in the field of security of la...
Over the past decade, lattice-based cryptography has emerged as one of the most promising candidates...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
In this paper we present a new NTRU-Like public key cryptosystem with security provably based on the...
V diplomski nalogi predstavimo problem LWE in šifrirno shemo osnovano na tem problemu. Pokažemo prav...