Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
暂无分享,去创建一个
[1] Vadim Lyubashevsky,et al. The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem , 2005, APPROX-RANDOM.
[2] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.
[3] Leonid A. Levin,et al. Pseudo-random Generation from one-way functions (Extended Abstracts) , 1989, STOC 1989.
[4] Matthew Green,et al. New Definitions and Separations for Circular Security , 2012, Public Key Cryptography.
[5] Daniel A. Spielman,et al. Linear-time encodable and decodable error-correcting codes , 1995, STOC '95.
[6] Chris Peikert,et al. An Efficient and Parallel Gaussian Sampler for Lattices , 2010, CRYPTO.
[7] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[8] Benny Applebaum,et al. Key-Dependent Message Security: Generic Amplification and Completeness , 2011, Journal of Cryptology.
[9] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[10] D. Spielman,et al. Expander codes , 1996 .
[11] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[12] Tibor Jager,et al. Practical Signatures from Standard Assumptions , 2013, EUROCRYPT.
[13] Rafail Ostrovsky,et al. Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.
[14] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[15] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[16] Jonathan Herzog,et al. Soundness of Formal Encryption in the Presence of Key-Cycles , 2005, ESORICS.
[17] Nico Döttling,et al. Cryptography based on the Hardness of Decoding , 2014 .
[18] Vadim Lyubashevsky,et al. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs , 2013, IACR Cryptol. ePrint Arch..
[19] Brent Waters,et al. Bi-Deniable Public-Key Encryption , 2011, CRYPTO.
[20] Christof Paar,et al. Lapin: An Efficient Authentication Protocol Based on Ring-LPN , 2012, FSE.
[21] Benny Applebaum. Garbling XOR Gates "For Free" in the Standard Model , 2013, TCC.
[22] Chris Peikert,et al. Circular and KDM Security for Identity-Based Encryption , 2012, Public Key Cryptography.
[23] Léo Ducas,et al. Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..
[24] John Black,et al. Encryption-Scheme Security in the Presence of Key-Dependent Messages , 2002, Selected Areas in Cryptography.
[25] Dorit Aharonov,et al. A lattice problem in quantum NP , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[26] Nico Döttling,et al. IND-CCA Secure Cryptography Based on a Variant of the LPN Problem , 2012, ASIACRYPT.
[27] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[28] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[29] Léo Ducas,et al. Improved Short Lattice Signatures in the Standard Model , 2014, CRYPTO.
[30] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[31] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[32] Dan Boneh,et al. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.
[33] David Cash,et al. Bonsai Trees, or How to Delegate a Lattice Basis , 2010, Journal of Cryptology.
[34] David Cash,et al. Cryptographic Agility and Its Relation to Circular Encryption , 2010, EUROCRYPT.
[35] Yuval Ishai,et al. Cryptography with Constant Input Locality , 2007, Journal of Cryptology.
[36] Daniele Micciancio,et al. Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[37] Michael Alekhnovich. More on Average Case vs Approximation Complexity , 2011, computational complexity.
[38] Eike Kiltz,et al. Simple Chosen-Ciphertext Security from Low-Noise LPN , 2014, Public Key Cryptography.
[39] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.
[40] Anderson C. A. Nascimento,et al. Universally Composable Oblivious Transfer Based on a Variant of LPN , 2014, CANS.
[41] G. David Forney,et al. Generalized minimum distance decoding , 1966, IEEE Trans. Inf. Theory.
[42] Steven R. Dunbar,et al. Topics in Probability Theory and Stochastic Processes , 2010 .