Trapdoors for hard lattices and new cryptographic constructions

作者: Craig Gentry , Chris Peikert , Vinod Vaikuntanathan

DOI: 10.1145/1374376.1374407

关键词:

摘要: We show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness standard lattice problems (such as approximating length shortest nonzero vector within certain polynomial factors). Our contributions include new notion trapdoor function with preimage sampling, simple and efficient "hash-and-sign" digital signature schemes, identity-based encryption. A core technical component our constructions is an algorithm that, given basis arbitrary lattice, samples points from discrete Gaussian probability distribution whose deviation essentially longest Gram-Schmidt basis. crucial security property that output oblivious particular geometry

参考文章(64)
Daniele Micciancio, S. Goldwasser, Complexity of lattice problems : a cryptographic perspective Springer. ,(2002)
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa, Multi-bit cryptosystems based on lattice problems public key cryptography. pp. 315- 329 ,(2007) , 10.1007/978-3-540-71677-8_21
Daniele Micciancio, S. Goldwasser, Complexity of lattice problems ,(2002)
Nicholas J. Hopper, Manuel Blum, Secure Human Identification Protocols international conference on the theory and application of cryptology and information security. pp. 52- 66 ,(2001) , 10.1007/3-540-45682-1_4
Yi-Kai Liu, Vadim Lyubashevsky, Daniele Micciancio, On Bounded Distance Decoding for General Lattices Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. pp. 450- 461 ,(2006) , 10.1007/11830924_41
Phong Q. Nguyen, Oded Regev, Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Advances in Cryptology - EUROCRYPT 2006. pp. 271- 288 ,(2006) , 10.1007/11761679_17
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Rosario Gennaro, Shai Halevi, Tal Rabin, Secure hash-and-sign signatures without the random oracle theory and application of cryptographic techniques. pp. 123- 139 ,(1999) , 10.1007/3-540-48910-X_9
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7