LWE-based Identification Schemes

被引:0
|
作者
Silva, Rosemberg [1 ]
Campello, Antonio C. de A., Jr. [2 ]
Dahab, Ricardo [1 ,3 ]
机构
[1] Univ Estadual Campinas, Inst Comp, BR-13083852 Sao Paulo, Brazil
[2] Univ Estadual Campinas, Inst Math Stat & Comp Sci, BR-13083859 Sao Paulo, Brazil
[3] Univ Estadual Campinas, Inst Comp, BR-13083859 Sao Paulo, Brazil
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Some hard problems from lattices, like LWE (Learning with Errors), are particularly suitable for application in Cryptography due to the possibility of using worst-case to average-case reductions as evidence of strong security properties. In this work, we show two LWE-based constructions of zero-knowledge identification schemes and discuss their performance and security. We also highlight the design choices that make our solution of both theoretical and practical interest.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] LWE-Based FHE with Better Parameters
    Wang, Fuqun
    Wang, Kunpeng
    Li, Bao
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 175 - 192
  • [2] AN LWE-BASED KEY TRANSFER PROTOCOL WITH ANONYMITY
    Georgescu, Adela
    TATRACRYPT '12, 2012, 53 : 119 - 135
  • [3] Packed Ciphertexts in LWE-Based Homomorphic Encryption
    Brakerski, Zvika
    Gentry, Craig
    Halevi, Shai
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 1 - 13
  • [4] On the Multi-user Security of LWE-Based NIKE
    Langrehr, Roman
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 33 - 62
  • [5] Better Key Sizes (and Attacks) for LWE-Based Encryption
    Lindner, Richard
    Peikert, Chris
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 319 - +
  • [6] A Homomorphic LWE-Based Verifiable Electronic Voting System
    Wu, Chen
    Tang, Shaohua
    Yan, Xingfu
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 98 - 105
  • [7] A LWE-Based Receiver-Deniable Encryption Scheme
    Chi, Po-Wen
    Wang, Ming-Hung
    Chuang, Yun-Hsin
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 124 - 133
  • [8] FFT Program Generation for Ring LWE-Based Cryptography
    Masuda, Masahiro
    Kameyama, Yukiyoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 151 - 171
  • [9] LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things
    Huth, Christopher
    Becker, Daniela
    Guajardo, Jorge
    Duplys, Paul
    Gueneysu, Tim
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 154 - 154
  • [10] A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer
    Mondal, Puja
    Kundu, Suparna
    Bhattacharya, Sarani
    Karmakar, Angshuman
    Verbauwhede, Ingrid
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 271 - 300