22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[Gen09b] C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169–178. 2009.<br />

[GGH97]<br />

[GH11]<br />

[GHV10]<br />

[GKV10]<br />

O. Goldreich, S. Goldwasser, and S. Halevi. Public-key cryptosystems from lattice reduction<br />

problems. In CRYPTO, pages 112–131. 1997.<br />

C. Gentry and S. Halevi. Fully homomorphic encryption without squashing using depth-3<br />

arithmetic circuits. In FOCS. 2011. To appear.<br />

C. Gentry, S. Halevi, and V. Vaikuntanathan. A simple BGN-type cryptosystem from LWE. In<br />

EUROCRYPT, pages 506–522. 2010.<br />

S. D. Gordon, J. Katz, and V. Vaikuntanathan. A group signature scheme from lattice assumptions.<br />

In ASIACRYPT, pages 395–412. 2010.<br />

[GN08] N. Gama and P. Q. Nguyen. Predicting lattice reduction. In EUROCRYPT, pages 31–51. 2008.<br />

[GPV08]<br />

[HW09]<br />

C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic<br />

constructions. In STOC, pages 197–206. 2008.<br />

S. Hohenberger and B. Waters. Short and stateless signatures from the RSA assumption. In<br />

CRYPTO, pages 654–670. 2009.<br />

[Kle00] P. N. Klein. Finding the closest lattice vector when it’s unusually close. In SODA, pages 937–941.<br />

2000.<br />

[KMO10]<br />

E. Kiltz, P. Mohassel, and A. O’Neill. Adaptive trapdoor functions and chosen-ciphertext security.<br />

In EUROCRYPT, pages 673–692. 2010.<br />

[KR00] H. Krawczyk and T. Rabin. Chameleon signatures. In NDSS. 2000.<br />

[LM06]<br />

[LM08]<br />

[LM09]<br />

V. Lyubashevsky and D. Micciancio. Generalized compact knapsacks are collision resistant. In<br />

ICALP (2), pages 144–155. 2006.<br />

V. Lyubashevsky and D. Micciancio. Asymptotically efficient lattice-based digital signatures. In<br />

TCC, pages 37–54. 2008.<br />

V. Lyubashevsky and D. Micciancio. On bounded distance decoding, unique shortest vectors,<br />

and the minimum distance problem. In CRYPTO, pages 577–594. 2009.<br />

[LMPR08] V. Lyubashevsky, D. Micciancio, C. Peikert, and A. Rosen. SWIFFT: A modest proposal for<br />

FFT hashing. In FSE, pages 54–72. 2008.<br />

[LP11]<br />

[LPR10]<br />

[Lyu08]<br />

R. Lindner and C. Peikert. Better key sizes (and attacks) for LWE-based encryption. In CT-RSA,<br />

pages 319–339. 2011.<br />

V. Lyubashevsky, C. Peikert, and O. Regev. On ideal lattices and learning with errors over rings.<br />

In EUROCRYPT, pages 1–23. 2010.<br />

V. Lyubashevsky. Lattice-based identification schemes secure under active attacks. In Public<br />

Key Cryptography, pages 162–179. 2008.<br />

39<br />

4. Trapdoors for Lattices

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!