We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
We revisit the problem of generating a ``hard\u27\u27 random lattice together with a basis of relati...
“All-but-many lossy trapdoor functions” (ABM-LTF) are a powerful cryptographic primitive studied by ...
We construct an efficient identity based encryption system based on the standard learning with error...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
We show how to construct a variety of “trapdoor ” cryptographic tools assuming the worstcase hardnes...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
We present a signature scheme provably secure in the standard model (no random oracles) based on the...
Threshold signature schemes enable distribution of the signature issuing capability to multiple user...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
We revisit the problem of generating a ``hard\u27\u27 random lattice together with a basis of relati...
“All-but-many lossy trapdoor functions” (ABM-LTF) are a powerful cryptographic primitive studied by ...
We construct an efficient identity based encryption system based on the standard learning with error...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceWe provide an alternative method for constructing lattice-based digital signat...
We show how to construct a variety of “trapdoor ” cryptographic tools assuming the worstcase hardnes...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Abstract. We provide an alternative method for constructing lattice-based digital signatures which d...
International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme,...
We present a signature scheme provably secure in the standard model (no random oracles) based on the...
Threshold signature schemes enable distribution of the signature issuing capability to multiple user...
In 2012, Lyubashevsky introduced a framework for obtaining efficient digital signatures relying on l...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
We revisit the problem of generating a ``hard\u27\u27 random lattice together with a basis of relati...
“All-but-many lossy trapdoor functions” (ABM-LTF) are a powerful cryptographic primitive studied by ...