Public Key Cryptography – PKC 2008
DOI: 10.1007/978-3-540-78440-1_17
|View full text |Cite
|
Sign up to set email alerts
|

A Digital Signature Scheme Based on CVP  ∞

Abstract: Abstract. In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, which security is related to the hardness of approximating the closest vector problem (CVP) in a lattice. Furthermore, they also described how to use the same principle of their encryption scheme to provide a signature scheme. Practically, this cryptosystem uses the euclidean norm, l2-norm, which has been used in many algorithms based on lattice theory. Nonetheless, many drawbacks h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 13 publications
(28 citation statements)
references
References 49 publications
0
28
0
Order By: Relevance
“…In PKC'08, Plantard, Susilo, and Win [17] proposed a new digital signature based on CVP ∞ , which was claimed to be a countermeasure against the Nguyen-Regev attack.…”
Section: Lattice Problems and Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations
“…In PKC'08, Plantard, Susilo, and Win [17] proposed a new digital signature based on CVP ∞ , which was claimed to be a countermeasure against the Nguyen-Regev attack.…”
Section: Lattice Problems and Algorithmsmentioning
confidence: 99%
“…Since each component of w i is in (−d, d), we know that each component of w i − w j is in (−2d, 2d). Since d ∈ Θ( √ n) as stated in [17], the lattice vectors w i − w j 's are very short.…”
Section: Key Idea Of Our Chosen Message Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…k ← k + 1, i ← (i + 1) mod n 9: until k = n 10: return w In brief, the message reduction is reducing successively each large coefficient m i of the message m by qD such that |m i − qD| < D but adding ±q, ±qb to m j with j = i according to the entries of M, until all coefficients of the reduced message are within (−D, D). Since S is diagonal dominant, the message can be reduced within bounded steps as proved in [26,27].…”
Section: Algorithm 1 Message Reduction In Drs Signature Algorithmmentioning
confidence: 99%