Conference of 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 ; Conference Date: 17 October 2016 Through 19 October 2016; Conference Code:126402International audienceA new Goldreich-Goldwasser-Halevi (GGH) cryptosystem is proposed using Generalized Low Density (GLD) lattices. These low density lattices can alleviate a major drawback of the GGH scheme, namely the huge size of its public key. Indeed, we show that the new GGH that we propose in this paper reduces the key size by one order of magnitude. In addition, we show that the key generation complexity as well as those of the encryption and decryption phases are significantly decreased. The security of this new GGH is highlighted throu...
Lattice based cryptography is one of the few hopes for secure public key cryptography in post quantu...
Update (Oct 2015): The key-agreement protocols that are described (or alluded to) in sections 6,7 ar...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Conference of 2016 International Conference on Advanced Communication Systems and Information Securi...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
The security of the Goldreich-Goldwasser-Halevi (GGH) cryptosystem is relying on the Smallest-Basis ...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Abstract. The GGH Graded Encoding Scheme [9], based on ideal lat-tices, is the first plausible appro...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Abstract. The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible ap-pr...
Lattice based cryptography is one of the few hopes for secure public key cryptography in post quantu...
Update (Oct 2015): The key-agreement protocols that are described (or alluded to) in sections 6,7 ar...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Conference of 2016 International Conference on Advanced Communication Systems and Information Securi...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
The security of the Goldreich-Goldwasser-Halevi (GGH) cryptosystem is relying on the Smallest-Basis ...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
Abstract. The GGH Graded Encoding Scheme [9], based on ideal lat-tices, is the first plausible appro...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Abstract. The GGH Graded Encoding Scheme [10], based on ideal lattices, is the first plausible ap-pr...
Lattice based cryptography is one of the few hopes for secure public key cryptography in post quantu...
Update (Oct 2015): The key-agreement protocols that are described (or alluded to) in sections 6,7 ar...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...