2018
DOI: 10.1007/978-3-030-01446-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signatures from the Middle-Product LWE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Since then, many wellknown lattice-based cryptosystems have been designed, including GGH [2] by Goldreich et al and NTRU [3] by Hoffstein et al, as well as LWE by Regev [4]. Nowadays, schemes with various features, such as digital signatures [5,6], identity-based and attribute-based encryption [7,8], zero-knowledge proof [9], and fully homomorphic schemes [10], can be realized based on these basic designs. On the contrary, the developments of methods in solving lattice problem including enumeration [11,12] and lattice reduction algorithms [13,14], as well as sieving algorithms [15,16], also contribute to the selection of parameters in these schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Since then, many wellknown lattice-based cryptosystems have been designed, including GGH [2] by Goldreich et al and NTRU [3] by Hoffstein et al, as well as LWE by Regev [4]. Nowadays, schemes with various features, such as digital signatures [5,6], identity-based and attribute-based encryption [7,8], zero-knowledge proof [9], and fully homomorphic schemes [10], can be realized based on these basic designs. On the contrary, the developments of methods in solving lattice problem including enumeration [11,12] and lattice reduction algorithms [13,14], as well as sieving algorithms [15,16], also contribute to the selection of parameters in these schemes.…”
Section: Introductionmentioning
confidence: 99%