2011
DOI: 10.1007/978-3-642-23082-0_7
|View full text |Cite
|
Sign up to set email alerts
|

The Geometry of Lattice Cryptography

Abstract: Lattice cryptography is one of the hottest and fastest moving areas in mathematical cryptography today. Interest in lattice cryptography is due to several concurring factors. On the theoretical side, lattice cryptography is supported by strong worst-case/average-case security guarantees. On the practical side, lattice cryptography has been shown to be very versatile, leading to an unprecedented variety of applications, from simple (and efficient) hash functions, to complex and powerful public key cryptographic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 84 publications
(129 reference statements)
0
6
0
Order By: Relevance
“…First, we review some previous work as following. Combining the above two lemmas, we have the following result which is also shown in reference [19]. Combining Klein's algorithm [17] and the relationship between primal and dual lattices, we first improve Lemma 3.3 using a randomized reduction algorithm.…”
Section: Lemma 29 ([17]) There Is a Randomized Algorithm Klein(b Tmentioning
confidence: 66%
“…First, we review some previous work as following. Combining the above two lemmas, we have the following result which is also shown in reference [19]. Combining Klein's algorithm [17] and the relationship between primal and dual lattices, we first improve Lemma 3.3 using a randomized reduction algorithm.…”
Section: Lemma 29 ([17]) There Is a Randomized Algorithm Klein(b Tmentioning
confidence: 66%
“…The generalization denoted as the i-th successive minima is defined such that the ballB(0, r) = {x ∈ R m | x ≤ r}, of radius r and center 0, contains at least i linearly independent vectors [Mic11].…”
Section: Lattices and Ideal Latticesmentioning
confidence: 99%
“…The SIVP asks for n short linearly independent vectors and is also provided as it plays an important role in the construction of cryptographic primitives [Mic11].…”
Section: Computational Problems On Latticesmentioning
confidence: 99%
“…Over a data set Q , let + , × , E n c , D e c , K r , and K u denotes the addition operation, the multiplication operation, the encryption process, the decryption process, the private key, and the public key, respectively. HOM allows homomorphic addition as follows: a+b=DecKr()EncKu(a)+EncKu(b),1ema,bQ. HOM allows homomorphic multiplication as follows: a×b=DecKr()EncKu(a)×EncKu(b),1ema,bQ. There are various encryption methods for the HOM layer, including those in . Random (RND) : The RND layer does not allow any efficient computation on ciphertext because it maps the same plaintext into different ciphertexts with overwhelming probability. This layer is the strongest among all the layers.…”
Section: Background Techniquesmentioning
confidence: 99%
“…The authors propose a scheme for smart grid in the paper , which processes data of all the dimensions. Other research on homomorphic encryption include .…”
Section: Related Workmentioning
confidence: 99%