This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich-Goldwasser-Halevi lattice-based encryption scheme, referred to as the GGH-MKA cryptosystem. The keys for this cryptosystem consisting of lattice bases where the private key is required to be a ‘good’ basis while the public key is required to be a ‘bad’ basis to ensure the cryptosystem works effectively. In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. If the value is ‘close to 1’, the basis is considered as a good basis. On the contrary, the basis is considered as a bad basis if its orthogonality-defect value is ‘far from 1’. Clearly,...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
Conference of 2016 International Conference on Advanced Communication Systems and Information Securi...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
MI: Global COE Program Education-and-Research Hub for Mathematics-for-IndustryグローバルCOEプログラム「マス・フォア・イ...
The security of the Goldreich-Goldwasser-Halevi (GGH) cryptosystem is relying on the Smallest-Basis ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
Conference of 2016 International Conference on Advanced Communication Systems and Information Securi...
Conference of 2nd International Conference on Frontiers of Signal Processing, ICFSP 2016 ; Conferenc...
Abstract—Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based c...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred...
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption sche...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, a...
MI: Global COE Program Education-and-Research Hub for Mathematics-for-IndustryグローバルCOEプログラム「マス・フォア・イ...
The security of the Goldreich-Goldwasser-Halevi (GGH) cryptosystem is relying on the Smallest-Basis ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece publi...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...